提交 341ab912 编写于 作者: S slguan

fix issue #569

上级 3dc152df
......@@ -188,7 +188,6 @@ typedef struct HttpContext {
HttpSqlCmd singleCmd;
HttpSqlCmds *multiCmds;
JsonBuf *jsonBuf;
pthread_mutex_t mutex;
HttpParser parser;
void *readTimer;
struct HttpThread *pThread;
......
......@@ -23,6 +23,7 @@
#include "http.h"
#include "httpHandle.h"
#include "tkey.h"
#define KEY_DES_4 4971256377704625728L
bool httpParseBasicAuthToken(HttpContext *pContext, char *token, int len) {
token[len] = '\0';
......@@ -65,3 +66,52 @@ bool httpParseBasicAuthToken(HttpContext *pContext, char *token, int len) {
pContext->user);
return true;
}
bool httpParseTaosdAuthToken(HttpContext *pContext, char *token, int len) {
token[len] = '\0';
int outlen = 0;
unsigned char *base64 = base64_decode(token, len, &outlen);
if (base64 == NULL || outlen == 0) {
httpError("context:%p, fd:%d, ip:%s, taosd token:%s parsed error", pContext, pContext->fd, pContext->ipstr, token);
return false;
}
if (outlen != (TSDB_USER_LEN + TSDB_PASSWORD_LEN)) {
httpError("context:%p, fd:%d, ip:%s, taosd token:%s length error", pContext, pContext->fd, pContext->ipstr, token);
free(base64);
return false;
}
char *descrypt = taosDesDecode(KEY_DES_4, (char *)base64, outlen);
if (descrypt == NULL) {
httpError("context:%p, fd:%d, ip:%s, taosd token:%s descrypt error", pContext, pContext->fd, pContext->ipstr,
token);
free(base64);
return false;
} else {
strncpy(pContext->user, descrypt, TSDB_USER_LEN);
strncpy(pContext->pass, descrypt + TSDB_USER_LEN, TSDB_PASSWORD_LEN);
httpTrace("context:%p, fd:%d, ip:%s, taosd token:%s parsed success, user:%s", pContext, pContext->fd,
pContext->ipstr, token, pContext->user);
free(base64);
free(descrypt);
return true;
}
}
bool httpGenTaosdAuthToken(HttpContext *pContext, char *token, int maxLen) {
char buffer[TSDB_USER_LEN + TSDB_PASSWORD_LEN] = {0};
strncpy(buffer, pContext->user, TSDB_USER_LEN);
strncpy(buffer + TSDB_USER_LEN, pContext->pass, TSDB_PASSWORD_LEN);
char *encrypt = taosDesEncode(KEY_DES_4, buffer, TSDB_USER_LEN + TSDB_PASSWORD_LEN);
char *base64 = base64_encode((const unsigned char *)encrypt, TSDB_USER_LEN + TSDB_PASSWORD_LEN);
strncpy(token, base64, (size_t)strlen(base64));
free(encrypt);
free(base64);
httpTrace("context:%p, fd:%d, ip:%s, gen taosd token:%s", pContext, pContext->fd, pContext->ipstr, token);
return true;
}
......@@ -224,8 +224,13 @@ bool httpParseHead(HttpContext* pContext) {
return false;
}
} else if (strncasecmp(pParser->pLast + 15, "Taosd ", 6) == 0) {
httpSendErrorResp(pContext, HTTP_INVALID_TAOSD_AUTH_TOKEN);
return false;
pParser->token.pos = pParser->pLast + 21;
pParser->token.len = (int16_t)(pParser->pCur - pParser->token.pos - 1);
bool parsed = httpParseTaosdAuthToken(pContext, pParser->token.pos, pParser->token.len);
if (!parsed) {
httpSendErrorResp(pContext, HTTP_INVALID_TAOSD_AUTH_TOKEN);
return false;
}
} else {
httpSendErrorResp(pContext, HTTP_INVALID_AUTH_TOKEN);
return false;
......@@ -269,51 +274,41 @@ bool httpParseChunkedBody(HttpContext* pContext, HttpParser* pParser, bool test)
}
bool httpReadChunkedBody(HttpContext* pContext, HttpParser* pParser) {
for (int tryTimes = 0; tryTimes < HTTP_READ_RETRY_TIMES; ++tryTimes) {
bool parsedOk = httpParseChunkedBody(pContext, pParser, true);
if (parsedOk) {
httpParseChunkedBody(pContext, pParser, false);
return HTTP_CHECK_BODY_SUCCESS;
bool parsedOk = httpParseChunkedBody(pContext, pParser, true);
if (parsedOk) {
httpParseChunkedBody(pContext, pParser, false);
return HTTP_CHECK_BODY_SUCCESS;
} else {
httpTrace("context:%p, fd:%d, ip:%s, chunked body not finished, continue read", pContext, pContext->fd,
pContext->ipstr);
if (!httpReadDataImp(pContext)) {
httpError("context:%p, fd:%d, ip:%s, read chunked request error", pContext, pContext->fd, pContext->ipstr);
return HTTP_CHECK_BODY_ERROR;
} else {
httpTrace("context:%p, fd:%d, ip:%s, chunked body not finished, continue read", pContext, pContext->fd,
pContext->ipstr);
if (!httpReadDataImp(pContext)) {
httpError("context:%p, fd:%d, ip:%s, read chunked request error", pContext, pContext->fd, pContext->ipstr);
return HTTP_CHECK_BODY_ERROR;
} else {
taosMsleep(HTTP_READ_WAIT_TIME_MS);
}
return HTTP_CHECK_BODY_CONTINUE;
}
}
httpTrace("context:%p, fd:%d, ip:%s, chunked body not finished, wait epoll", pContext, pContext->fd, pContext->ipstr);
return HTTP_CHECK_BODY_CONTINUE;
}
int httpReadUnChunkedBody(HttpContext* pContext, HttpParser* pParser) {
for (int tryTimes = 0; tryTimes < HTTP_READ_RETRY_TIMES; ++tryTimes) {
int dataReadLen = pParser->bufsize - (int)(pParser->data.pos - pParser->buffer);
if (dataReadLen > pParser->data.len) {
httpError("context:%p, fd:%d, ip:%s, un-chunked body length invalid, dataReadLen:%d > pContext->data.len:%d",
pContext, pContext->fd, pContext->ipstr, dataReadLen, pParser->data.len);
httpSendErrorResp(pContext, HTTP_PARSE_BODY_ERROR);
int dataReadLen = pParser->bufsize - (int)(pParser->data.pos - pParser->buffer);
if (dataReadLen > pParser->data.len) {
httpError("context:%p, fd:%d, ip:%s, un-chunked body length invalid, dataReadLen:%d > pContext->data.len:%d",
pContext, pContext->fd, pContext->ipstr, dataReadLen, pParser->data.len);
httpSendErrorResp(pContext, HTTP_PARSE_BODY_ERROR);
return HTTP_CHECK_BODY_ERROR;
} else if (dataReadLen < pParser->data.len) {
httpTrace("context:%p, fd:%d, ip:%s, un-chunked body not finished, dataReadLen:%d < pContext->data.len:%d, continue read",
pContext, pContext->fd, pContext->ipstr, dataReadLen, pParser->data.len);
if (!httpReadDataImp(pContext)) {
httpError("context:%p, fd:%d, ip:%s, read chunked request error", pContext, pContext->fd, pContext->ipstr);
return HTTP_CHECK_BODY_ERROR;
} else if (dataReadLen < pParser->data.len) {
httpTrace("context:%p, fd:%d, ip:%s, un-chunked body not finished, dataReadLen:%d < pContext->data.len:%d, continue read",
pContext, pContext->fd, pContext->ipstr, dataReadLen, pParser->data.len);
if (!httpReadDataImp(pContext)) {
httpError("context:%p, fd:%d, ip:%s, read chunked request error", pContext, pContext->fd, pContext->ipstr);
return HTTP_CHECK_BODY_ERROR;
} else {
taosMsleep(HTTP_READ_WAIT_TIME_MS);
}
} else {
return HTTP_CHECK_BODY_SUCCESS;
return HTTP_CHECK_BODY_CONTINUE;
}
} else {
return HTTP_CHECK_BODY_SUCCESS;
}
httpTrace("context:%p, fd:%d, ip:%s, un-chunked body not finished, wait epoll", pContext, pContext->fd, pContext->ipstr);
return HTTP_CHECK_BODY_CONTINUE;
}
bool httpParseRequest(HttpContext* pContext) {
......
......@@ -73,18 +73,10 @@ HttpContext *httpCreateContext(HttpServer *pServer) {
pContext->signature = pContext;
pContext->httpVersion = HTTP_VERSION_10;
pContext->lastAccessTime = taosGetTimestampSec();
if (pthread_mutex_init(&(pContext->mutex), NULL) < 0) {
httpFreeContext(pServer, pContext);
return NULL;
}
return pContext;
}
void httpFreeContext(HttpServer *pServer, HttpContext *pContext) {
pthread_mutex_unlock(&pContext->mutex);
pthread_mutex_destroy(&pContext->mutex);
if (pContext->fromMemPool) {
httpTrace("context:%p, is freed from mempool", pContext);
taosMemPoolFree(pServer->pContextPool, (char *)pContext);
......@@ -103,7 +95,12 @@ void httpCleanUpContextTimer(HttpContext *pContext) {
}
void httpCleanUpContext(HttpThread *pThread, HttpContext *pContext) {
// for not keep-alive
void *sigature = __sync_val_compare_and_swap_64(&pContext->signature, pContext->signature, 0);
if (sigature == NULL) {
httpTrace("context:%p is freed by another thread.", pContext);
return;
}
httpCleanUpContextTimer(pContext);
if (pContext->fd >= 0) {
......@@ -182,13 +179,7 @@ void httpCloseContextByApp(HttpContext *pContext) {
return;
}
pthread_mutex_lock(&pContext->mutex);
if (pContext->signature != pContext) {
return;
}
pContext->parsed = false;
httpTrace("context:%p, fd:%d, ip:%s, app use finished, usedByEpoll:%d, usedByApp:%d, httpVersion:1.%d, keepAlive:%d",
pContext, pContext->fd, pContext->ipstr, pContext->usedByEpoll, pContext->usedByApp, pContext->httpVersion,
pContext->httpKeepAlive);
......@@ -202,7 +193,6 @@ void httpCloseContextByApp(HttpContext *pContext) {
httpCleanUpContext(pThread, pContext);
} else {
pContext->usedByApp = 0;
pthread_mutex_unlock(&pContext->mutex);
}
}
}
......@@ -211,14 +201,8 @@ void httpCloseContextByServer(HttpThread *pThread, HttpContext *pContext) {
if (pContext->signature != pContext || pContext->pThread != pThread) {
return;
}
pthread_mutex_lock(&pContext->mutex);
if (pContext->signature != pContext) {
return;
}
pContext->usedByEpoll = 0;
pContext->parsed = false;
httpTrace("context:%p, fd:%d, ip:%s, epoll use finished, usedByEpoll:%d, usedByApp:%d",
pContext, pContext->fd, pContext->ipstr, pContext->usedByEpoll, pContext->usedByApp);
......@@ -231,7 +215,7 @@ void httpCloseContextByServer(HttpThread *pThread, HttpContext *pContext) {
if (!pContext->usedByApp) {
httpCleanUpContext(pThread, pContext);
} else {
pthread_mutex_unlock(&pContext->mutex);
pContext->usedByEpoll = 0;
}
}
......@@ -281,7 +265,6 @@ void httpReadDirtyData(int fd) {
bool httpReadDataImp(HttpContext *pContext) {
HttpParser *pParser = &pContext->parser;
int blocktimes = 0;
while (pParser->bufsize <= (HTTP_BUFFER_SIZE - HTTP_STEP_SIZE)) {
int nread = (int)taosReadSocket(pContext->fd, pParser->buffer + pParser->bufsize, HTTP_STEP_SIZE);
if (nread >= 0 && nread < HTTP_STEP_SIZE) {
......@@ -289,13 +272,9 @@ bool httpReadDataImp(HttpContext *pContext) {
break;
} else if (nread < 0) {
if (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK) {
if (blocktimes++ > HTTP_READ_RETRY_TIMES) {
taosMsleep(HTTP_READ_WAIT_TIME_MS);
httpTrace("context:%p, fd:%d, ip:%s, read from socket error:%d, error times:%d",
pContext, pContext->fd, pContext->ipstr, errno, blocktimes);
break;
}
continue;
httpTrace("context:%p, fd:%d, ip:%s, read from socket error:%d, wait another event",
pContext, pContext->fd, pContext->ipstr, errno);
break;
} else {
httpError("context:%p, fd:%d, ip:%s, read from socket error:%d, close connect",
pContext, pContext->fd, pContext->ipstr, errno);
......@@ -575,6 +554,8 @@ bool httpInitConnect(HttpServer *pServer) {
}
memset(pServer->pThreads, 0, sizeof(HttpThread) * (size_t)pServer->numOfThreads);
pthread_attr_init(&thattr);
pthread_attr_setdetachstate(&thattr, PTHREAD_CREATE_JOINABLE);
pThread = pServer->pThreads;
for (i = 0; i < pServer->numOfThreads; ++i) {
sprintf(pThread->label, "%s%d", pServer->label, i);
......@@ -598,8 +579,6 @@ bool httpInitConnect(HttpServer *pServer) {
return false;
}
pthread_attr_init(&thattr);
pthread_attr_setdetachstate(&thattr, PTHREAD_CREATE_JOINABLE);
if (pthread_create(&(pThread->thread), &thattr, (void *)httpProcessHttpData, (void *)(pThread)) != 0) {
httpError("http thread:%s, failed to create HTTP process data thread, reason:%s",
pThread->label, strerror(errno));
......@@ -610,8 +589,6 @@ bool httpInitConnect(HttpServer *pServer) {
pThread++;
}
pthread_attr_init(&thattr);
pthread_attr_setdetachstate(&thattr, PTHREAD_CREATE_JOINABLE);
if (pthread_create(&(pServer->thread), &thattr, (void *)httpAcceptHttpConnection, (void *)(pServer)) != 0) {
httpError("http server:%s, failed to create Http accept thread, reason:%s", pServer->label, strerror(errno));
return false;
......
......@@ -28,8 +28,12 @@
#include "ttimer.h"
void httpAccessSession(HttpContext *pContext) {
if (pContext->session == pContext->session->signature)
pContext->session->expire = (int)taosGetTimestampSec() + pContext->pThread->pServer->sessionExpire;
HttpServer *server = pContext->pThread->pServer;
pthread_mutex_lock(&server->serverMutex);
if (pContext->session == pContext->session->signature) {
pContext->session->expire = (int) taosGetTimestampSec() + pContext->pThread->pServer->sessionExpire;
}
pthread_mutex_unlock(&server->serverMutex);
}
void httpCreateSession(HttpContext *pContext, void *taos) {
......@@ -53,6 +57,8 @@ void httpCreateSession(HttpContext *pContext, void *taos) {
httpError("context:%p, fd:%d, ip:%s, user:%s, error:%s", pContext, pContext->fd, pContext->ipstr, pContext->user,
httpMsg[HTTP_SESSION_FULL]);
taos_close(taos);
pthread_mutex_unlock(&server->serverMutex);
return;
}
pContext->session->signature = pContext->session;
......@@ -82,10 +88,14 @@ void httpFetchSession(HttpContext *pContext) {
void httpRestoreSession(HttpContext *pContext) {
HttpServer * server = pContext->pThread->pServer;
HttpSession *session = pContext->session;
if (session == NULL || session != session->signature) return;
// all access to the session is via serverMutex
pthread_mutex_lock(&server->serverMutex);
HttpSession *session = pContext->session;
if (session == NULL || session != session->signature) {
pthread_mutex_unlock(&server->serverMutex);
return;
}
session->access--;
httpTrace("context:%p, ip:%s, user:%s, restore session:%p:%s:%p, access:%d, expire:%d",
pContext, pContext->ipstr, pContext->user, session, session->id, session->taos,
......@@ -127,7 +137,7 @@ bool httpInitAllSessions(HttpServer *pServer) {
int httpSessionExpired(char *session) {
HttpSession *pSession = (HttpSession *)session;
time_t cur = time(NULL);
time_t cur = taosGetTimestampSec();
if (pSession->taos != NULL) {
if (pSession->expire > cur) {
......
......@@ -300,10 +300,14 @@ void httpProcessSingleSqlCmd(HttpContext *pContext) {
}
void httpProcessLoginCmd(HttpContext *pContext) {
char token[128] = "current version only supports basic authorization, no token returned";
httpTrace("context:%p, fd:%d, ip:%s, user:%s, login via http, return token:%s",
char token[128] = {0};
if (!httpGenTaosdAuthToken(pContext, token, 128)) {
httpSendErrorResp(pContext, HTTP_GEN_TAOSD_TOKEN_ERR);
} else {
httpTrace("context:%p, fd:%d, ip:%s, user:%s, login via http, return token:%s",
pContext, pContext->fd, pContext->ipstr, pContext->user, token);
httpSendSuccResp(pContext, token);
httpSendSuccResp(pContext, token);
}
}
void httpProcessHeartBeatCmd(HttpContext *pContext) {
......
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include "tkey.h"
#define ENCRYPTION_MODE 1
#define DECRYPTION_MODE 0
typedef struct {
unsigned char k[8];
unsigned char c[4];
unsigned char d[4];
} key_set;
void generate_key(unsigned char* key);
void generate_sub_keys(unsigned char* main_key, key_set* key_sets);
void process_message(unsigned char* message_piece, unsigned char* processed_piece, key_set* key_sets, int mode);
int64_t taosDesGenKey() {
unsigned int iseed = (unsigned int)time(NULL);
srand(iseed);
unsigned char key[8] = {0};
generate_key(key);
return *((int64_t*)key);
}
char* taosDesImp(unsigned char* key, char* src, unsigned int len, int process_mode) {
unsigned int number_of_blocks = len / 8;
unsigned char data_block[9] = {0};
unsigned char processed_block[9] = {0};
key_set key_sets[17] = {0};
char* dest = calloc(len + 1, 1);
generate_sub_keys(key, key_sets);
for (unsigned int block_count = 0; block_count < number_of_blocks; block_count++) {
memset(processed_block, 0, 8);
memcpy(data_block, src + block_count * 8, 8);
process_message(data_block, processed_block, key_sets, process_mode);
memcpy(dest + block_count * 8, processed_block, 8);
}
return dest;
}
char* taosDesEncode(int64_t key, char* src, int len) {
if (len % 8 != 0) return NULL;
unsigned char* keyStr = (unsigned char*)(&key);
return taosDesImp(keyStr, src, len, ENCRYPTION_MODE);
}
char* taosDesDecode(int64_t key, char* src, int len) {
unsigned char* keyStr = (unsigned char*)(&key);
char* temp = calloc(len + 8, 1);
memcpy(temp, src, len);
len += 8;
char* decode = taosDesImp(keyStr, temp, len, DECRYPTION_MODE);
free(temp);
return decode;
}
int initial_key_permutaion[] = {57, 49, 41, 33, 25, 17, 9, 1, 58, 50, 42, 34, 26, 18, 10, 2, 59, 51, 43,
35, 27, 19, 11, 3, 60, 52, 44, 36, 63, 55, 47, 39, 31, 23, 15, 7, 62, 54,
46, 38, 30, 22, 14, 6, 61, 53, 45, 37, 29, 21, 13, 5, 28, 20, 12, 4};
int initial_message_permutation[] = {58, 50, 42, 34, 26, 18, 10, 2, 60, 52, 44, 36, 28, 20, 12, 4,
62, 54, 46, 38, 30, 22, 14, 6, 64, 56, 48, 40, 32, 24, 16, 8,
57, 49, 41, 33, 25, 17, 9, 1, 59, 51, 43, 35, 27, 19, 11, 3,
61, 53, 45, 37, 29, 21, 13, 5, 63, 55, 47, 39, 31, 23, 15, 7};
int key_shift_sizes[] = {-1, 1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1};
int sub_key_permutation[] = {14, 17, 11, 24, 1, 5, 3, 28, 15, 6, 21, 10, 23, 19, 12, 4,
26, 8, 16, 7, 27, 20, 13, 2, 41, 52, 31, 37, 47, 55, 30, 40,
51, 45, 33, 48, 44, 49, 39, 56, 34, 53, 46, 42, 50, 36, 29, 32};
int message_expansion[] = {32, 1, 2, 3, 4, 5, 4, 5, 6, 7, 8, 9, 8, 9, 10, 11,
12, 13, 12, 13, 14, 15, 16, 17, 16, 17, 18, 19, 20, 21, 20, 21,
22, 23, 24, 25, 24, 25, 26, 27, 28, 29, 28, 29, 30, 31, 32, 1};
int S1[] = {14, 4, 13, 1, 2, 15, 11, 8, 3, 10, 6, 12, 5, 9, 0, 7, 0, 15, 7, 4, 14, 2,
13, 1, 10, 6, 12, 11, 9, 5, 3, 8, 4, 1, 14, 8, 13, 6, 2, 11, 15, 12, 9, 7,
3, 10, 5, 0, 15, 12, 8, 2, 4, 9, 1, 7, 5, 11, 3, 14, 10, 0, 6, 13};
int S2[] = {15, 1, 8, 14, 6, 11, 3, 4, 9, 7, 2, 13, 12, 0, 5, 10, 3, 13, 4, 7, 15, 2,
8, 14, 12, 0, 1, 10, 6, 9, 11, 5, 0, 14, 7, 11, 10, 4, 13, 1, 5, 8, 12, 6,
9, 3, 2, 15, 13, 8, 10, 1, 3, 15, 4, 2, 11, 6, 7, 12, 0, 5, 14, 9};
int S3[] = {10, 0, 9, 14, 6, 3, 15, 5, 1, 13, 12, 7, 11, 4, 2, 8, 13, 7, 0, 9, 3, 4,
6, 10, 2, 8, 5, 14, 12, 11, 15, 1, 13, 6, 4, 9, 8, 15, 3, 0, 11, 1, 2, 12,
5, 10, 14, 7, 1, 10, 13, 0, 6, 9, 8, 7, 4, 15, 14, 3, 11, 5, 2, 12};
int S4[] = {7, 13, 14, 3, 0, 6, 9, 10, 1, 2, 8, 5, 11, 12, 4, 15, 13, 8, 11, 5, 6, 15,
0, 3, 4, 7, 2, 12, 1, 10, 14, 9, 10, 6, 9, 0, 12, 11, 7, 13, 15, 1, 3, 14,
5, 2, 8, 4, 3, 15, 0, 6, 10, 1, 13, 8, 9, 4, 5, 11, 12, 7, 2, 14};
int S5[] = {2, 12, 4, 1, 7, 10, 11, 6, 8, 5, 3, 15, 13, 0, 14, 9, 14, 11, 2, 12, 4, 7,
13, 1, 5, 0, 15, 10, 3, 9, 8, 6, 4, 2, 1, 11, 10, 13, 7, 8, 15, 9, 12, 5,
6, 3, 0, 14, 11, 8, 12, 7, 1, 14, 2, 13, 6, 15, 0, 9, 10, 4, 5, 3};
int S6[] = {12, 1, 10, 15, 9, 2, 6, 8, 0, 13, 3, 4, 14, 7, 5, 11, 10, 15, 4, 2, 7, 12,
9, 5, 6, 1, 13, 14, 0, 11, 3, 8, 9, 14, 15, 5, 2, 8, 12, 3, 7, 0, 4, 10,
1, 13, 11, 6, 4, 3, 2, 12, 9, 5, 15, 10, 11, 14, 1, 7, 6, 0, 8, 13};
int S7[] = {4, 11, 2, 14, 15, 0, 8, 13, 3, 12, 9, 7, 5, 10, 6, 1, 13, 0, 11, 7, 4, 9,
1, 10, 14, 3, 5, 12, 2, 15, 8, 6, 1, 4, 11, 13, 12, 3, 7, 14, 10, 15, 6, 8,
0, 5, 9, 2, 6, 11, 13, 8, 1, 4, 10, 7, 9, 5, 0, 15, 14, 2, 3, 12};
int S8[] = {13, 2, 8, 4, 6, 15, 11, 1, 10, 9, 3, 14, 5, 0, 12, 7, 1, 15, 13, 8, 10, 3,
7, 4, 12, 5, 6, 11, 0, 14, 9, 2, 7, 11, 4, 1, 9, 12, 14, 2, 0, 6, 10, 13,
15, 3, 5, 8, 2, 1, 14, 7, 4, 10, 8, 13, 15, 12, 9, 0, 3, 5, 6, 11};
int right_sub_message_permutation[] = {16, 7, 20, 21, 29, 12, 28, 17, 1, 15, 23, 26, 5, 18, 31, 10,
2, 8, 24, 14, 32, 27, 3, 9, 19, 13, 30, 6, 22, 11, 4, 25};
int final_message_permutation[] = {40, 8, 48, 16, 56, 24, 64, 32, 39, 7, 47, 15, 55, 23, 63, 31,
38, 6, 46, 14, 54, 22, 62, 30, 37, 5, 45, 13, 53, 21, 61, 29,
36, 4, 44, 12, 52, 20, 60, 28, 35, 3, 43, 11, 51, 19, 59, 27,
34, 2, 42, 10, 50, 18, 58, 26, 33, 1, 41, 9, 49, 17, 57, 25};
void print_char_as_binary(char input) {
int i;
for (i = 0; i < 8; i++) {
char shift_byte = 0x01 << (7 - i);
if (shift_byte & input) {
printf("1");
} else {
printf("0");
}
}
}
void generate_key(unsigned char* key) {
int i;
for (i = 0; i < 8; i++) {
key[i] = rand() % 255;
}
}
void print_key_set(key_set key_set) {
int i;
printf("K: \n");
for (i = 0; i < 8; i++) {
printf("%02X : ", key_set.k[i]);
print_char_as_binary(key_set.k[i]);
printf("\n");
}
printf("\nC: \n");
for (i = 0; i < 4; i++) {
printf("%02X : ", key_set.c[i]);
print_char_as_binary(key_set.c[i]);
printf("\n");
}
printf("\nD: \n");
for (i = 0; i < 4; i++) {
printf("%02X : ", key_set.d[i]);
print_char_as_binary(key_set.d[i]);
printf("\n");
}
printf("\n");
}
void generate_sub_keys(unsigned char* main_key, key_set* key_sets) {
int i, j;
int shift_size;
unsigned char shift_byte, first_shift_bits, second_shift_bits, third_shift_bits, fourth_shift_bits;
for (i = 0; i < 8; i++) {
key_sets[0].k[i] = 0;
}
for (i = 0; i < 56; i++) {
shift_size = initial_key_permutaion[i];
shift_byte = 0x80 >> ((shift_size - 1) % 8);
shift_byte &= main_key[(shift_size - 1) / 8];
shift_byte <<= ((shift_size - 1) % 8);
key_sets[0].k[i / 8] |= (shift_byte >> i % 8);
}
for (i = 0; i < 3; i++) {
key_sets[0].c[i] = key_sets[0].k[i];
}
key_sets[0].c[3] = key_sets[0].k[3] & 0xF0;
for (i = 0; i < 3; i++) {
key_sets[0].d[i] = (key_sets[0].k[i + 3] & 0x0F) << 4;
key_sets[0].d[i] |= (key_sets[0].k[i + 4] & 0xF0) >> 4;
}
key_sets[0].d[3] = (key_sets[0].k[6] & 0x0F) << 4;
for (i = 1; i < 17; i++) {
for (j = 0; j < 4; j++) {
key_sets[i].c[j] = key_sets[i - 1].c[j];
key_sets[i].d[j] = key_sets[i - 1].d[j];
}
shift_size = key_shift_sizes[i];
if (shift_size == 1) {
shift_byte = 0x80;
} else {
shift_byte = 0xC0;
}
// Process C
first_shift_bits = shift_byte & key_sets[i].c[0];
second_shift_bits = shift_byte & key_sets[i].c[1];
third_shift_bits = shift_byte & key_sets[i].c[2];
fourth_shift_bits = shift_byte & key_sets[i].c[3];
key_sets[i].c[0] <<= shift_size;
key_sets[i].c[0] |= (second_shift_bits >> (8 - shift_size));
key_sets[i].c[1] <<= shift_size;
key_sets[i].c[1] |= (third_shift_bits >> (8 - shift_size));
key_sets[i].c[2] <<= shift_size;
key_sets[i].c[2] |= (fourth_shift_bits >> (8 - shift_size));
key_sets[i].c[3] <<= shift_size;
key_sets[i].c[3] |= (first_shift_bits >> (4 - shift_size));
// Process D
first_shift_bits = shift_byte & key_sets[i].d[0];
second_shift_bits = shift_byte & key_sets[i].d[1];
third_shift_bits = shift_byte & key_sets[i].d[2];
fourth_shift_bits = shift_byte & key_sets[i].d[3];
key_sets[i].d[0] <<= shift_size;
key_sets[i].d[0] |= (second_shift_bits >> (8 - shift_size));
key_sets[i].d[1] <<= shift_size;
key_sets[i].d[1] |= (third_shift_bits >> (8 - shift_size));
key_sets[i].d[2] <<= shift_size;
key_sets[i].d[2] |= (fourth_shift_bits >> (8 - shift_size));
key_sets[i].d[3] <<= shift_size;
key_sets[i].d[3] |= (first_shift_bits >> (4 - shift_size));
for (j = 0; j < 48; j++) {
shift_size = sub_key_permutation[j];
if (shift_size <= 28) {
shift_byte = 0x80 >> ((shift_size - 1) % 8);
shift_byte &= key_sets[i].c[(shift_size - 1) / 8];
shift_byte <<= ((shift_size - 1) % 8);
} else {
shift_byte = 0x80 >> ((shift_size - 29) % 8);
shift_byte &= key_sets[i].d[(shift_size - 29) / 8];
shift_byte <<= ((shift_size - 29) % 8);
}
key_sets[i].k[j / 8] |= (shift_byte >> j % 8);
}
}
}
void process_message(unsigned char* message_piece, unsigned char* processed_piece, key_set* key_sets, int mode) {
int i, k;
int shift_size;
unsigned char shift_byte;
unsigned char initial_permutation[8];
memset(initial_permutation, 0, 8);
memset(processed_piece, 0, 8);
for (i = 0; i < 64; i++) {
shift_size = initial_message_permutation[i];
shift_byte = 0x80 >> ((shift_size - 1) % 8);
shift_byte &= message_piece[(shift_size - 1) / 8];
shift_byte <<= ((shift_size - 1) % 8);
initial_permutation[i / 8] |= (shift_byte >> i % 8);
}
unsigned char l[4], r[4];
for (i = 0; i < 4; i++) {
l[i] = initial_permutation[i];
r[i] = initial_permutation[i + 4];
}
unsigned char ln[4], rn[4], er[6], ser[4];
int key_index;
for (k = 1; k <= 16; k++) {
memcpy(ln, r, 4);
memset(er, 0, 6);
for (i = 0; i < 48; i++) {
shift_size = message_expansion[i];
shift_byte = 0x80 >> ((shift_size - 1) % 8);
shift_byte &= r[(shift_size - 1) / 8];
shift_byte <<= ((shift_size - 1) % 8);
er[i / 8] |= (shift_byte >> i % 8);
}
if (mode == DECRYPTION_MODE) {
key_index = 17 - k;
} else {
key_index = k;
}
for (i = 0; i < 6; i++) {
er[i] ^= key_sets[key_index].k[i];
}
unsigned char row, column;
for (i = 0; i < 4; i++) {
ser[i] = 0;
}
// 0000 0000 0000 0000 0000 0000
// rccc crrc cccr rccc crrc cccr
// Byte 1
row = 0;
row |= ((er[0] & 0x80) >> 6);
row |= ((er[0] & 0x04) >> 2);
column = 0;
column |= ((er[0] & 0x78) >> 3);
ser[0] |= ((unsigned char)S1[row * 16 + column] << 4);
row = 0;
row |= (er[0] & 0x02);
row |= ((er[1] & 0x10) >> 4);
column = 0;
column |= ((er[0] & 0x01) << 3);
column |= ((er[1] & 0xE0) >> 5);
ser[0] |= (unsigned char)S2[row * 16 + column];
// Byte 2
row = 0;
row |= ((er[1] & 0x08) >> 2);
row |= ((er[2] & 0x40) >> 6);
column = 0;
column |= ((er[1] & 0x07) << 1);
column |= ((er[2] & 0x80) >> 7);
ser[1] |= ((unsigned char)S3[row * 16 + column] << 4);
row = 0;
row |= ((er[2] & 0x20) >> 4);
row |= (er[2] & 0x01);
column = 0;
column |= ((er[2] & 0x1E) >> 1);
ser[1] |= (unsigned char)S4[row * 16 + column];
// Byte 3
row = 0;
row |= ((er[3] & 0x80) >> 6);
row |= ((er[3] & 0x04) >> 2);
column = 0;
column |= ((er[3] & 0x78) >> 3);
ser[2] |= ((unsigned char)S5[row * 16 + column] << 4);
row = 0;
row |= (er[3] & 0x02);
row |= ((er[4] & 0x10) >> 4);
column = 0;
column |= ((er[3] & 0x01) << 3);
column |= ((er[4] & 0xE0) >> 5);
ser[2] |= (unsigned char)S6[row * 16 + column];
// Byte 4
row = 0;
row |= ((er[4] & 0x08) >> 2);
row |= ((er[5] & 0x40) >> 6);
column = 0;
column |= ((er[4] & 0x07) << 1);
column |= ((er[5] & 0x80) >> 7);
ser[3] |= ((unsigned char)S7[row * 16 + column] << 4);
row = 0;
row |= ((er[5] & 0x20) >> 4);
row |= (er[5] & 0x01);
column = 0;
column |= ((er[5] & 0x1E) >> 1);
ser[3] |= (unsigned char)S8[row * 16 + column];
for (i = 0; i < 4; i++) {
rn[i] = 0;
}
for (i = 0; i < 32; i++) {
shift_size = right_sub_message_permutation[i];
shift_byte = 0x80 >> ((shift_size - 1) % 8);
shift_byte &= ser[(shift_size - 1) / 8];
shift_byte <<= ((shift_size - 1) % 8);
rn[i / 8] |= (shift_byte >> i % 8);
}
for (i = 0; i < 4; i++) {
rn[i] ^= l[i];
}
for (i = 0; i < 4; i++) {
l[i] = ln[i];
r[i] = rn[i];
}
}
unsigned char pre_end_permutation[8];
for (i = 0; i < 4; i++) {
pre_end_permutation[i] = r[i];
pre_end_permutation[4 + i] = l[i];
}
for (i = 0; i < 64; i++) {
shift_size = final_message_permutation[i];
shift_byte = 0x80 >> ((shift_size - 1) % 8);
shift_byte &= pre_end_permutation[(shift_size - 1) / 8];
shift_byte <<= ((shift_size - 1) % 8);
processed_piece[i / 8] |= (shift_byte >> i % 8);
}
}
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册