46 for (i = 0; i < 4; i++)
57 uint32_t k0, k1, k2, k3;
68 uint32_t
delta = 0x9E3779B9
U, sum = delta * (rounds / 2);
70 for (i = 0; i < rounds / 2; i++) {
72 v0 -= ((v1 << 4) + k0) ^ (v1 + sum) ^ ((v1 >> 5) + k1);
82 uint32_t sum = 0,
delta = 0x9E3779B9
U;
84 for (i = 0; i < rounds / 2; i++) {
86 v0 += ((v1 << 4) + k0) ^ (v1 + sum) ^ ((v1 >> 5) + k1);
110 for (i = 0; i < 8; i++)
111 dst[i] = src[i] ^ iv[i];
126 #define TEA_NUM_TESTS 4
129 static const uint8_t tea_test_key[TEA_NUM_TESTS][16] = {
130 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
131 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
133 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
134 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
136 { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
137 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF
139 { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
140 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF
144 static const uint8_t tea_test_pt[TEA_NUM_TESTS][8] = {
145 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
146 { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08 },
147 { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08 },
148 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }
151 static const uint8_t tea_test_ct[TEA_NUM_TESTS][8] = {
152 { 0x41, 0xEA, 0x3A, 0x0A, 0x94, 0xBA, 0xA9, 0x40 },
153 { 0x6A, 0x2F, 0x9C, 0xF3, 0xFC, 0xCF, 0x3C, 0x55 },
154 { 0xDE, 0xB1, 0xC0, 0xA2, 0x7E, 0x74, 0x5D, 0xB3 },
155 { 0x12, 0x6C, 0x6B, 0x92, 0xC0, 0x65, 0x3A, 0x3E }
163 if (memcmp(dst, ref, 8*len)) {
165 printf(
"%s failed\ngot ", test);
166 for (i = 0; i < 8*
len; i++)
167 printf(
"%02x ", dst[i]);
168 printf(
"\nexpected ");
169 for (i = 0; i < 8*
len; i++)
170 printf(
"%02x ", ref[i]);
181 static const uint8_t src[32] =
"HelloWorldHelloWorldHelloWorld";
189 for (i = 0; i < TEA_NUM_TESTS; i++) {
192 test_tea(ctx, buf, tea_test_pt[i], tea_test_ct[i], 1,
NULL, 0,
"encryption");
193 test_tea(ctx, buf, tea_test_ct[i], tea_test_pt[i], 1,
NULL, 1,
"decryption");
196 memcpy(iv,
"HALLO123", 8);
200 memcpy(iv,
"HALLO123", 8);
201 test_tea(ctx, pl, ct, src, 4, iv, 1,
"CBC decryption");
203 memcpy(iv,
"HALLO123", 8);
204 test_tea(ctx, ct, ct, src, 4, iv, 1,
"CBC inplace decryption");
207 printf(
"Test encryption/decryption success.\n");
static void tea_crypt_ecb(AVTEA *ctx, uint8_t *dst, const uint8_t *src, int decrypt, uint8_t *iv)
struct AVTEA * av_tea_alloc(void)
Allocate an AVTEA context To free the struct: av_free(ptr)
uint64_t_TMPL AV_WL64 unsigned int_TMPL AV_WL32 unsigned int_TMPL AV_WL24 unsigned int_TMPL AV_WL16 uint64_t_TMPL AV_WB64 unsigned int_TMPL AV_RB32
static void test(const char *pattern, const char *host)
Public header for libavutil TEA algorithm.
void av_tea_crypt(AVTEA *ctx, uint8_t *dst, const uint8_t *src, int count, uint8_t *iv, int decrypt)
Encrypt or decrypt a buffer using a previously initialized context.
common internal and external API header
void av_tea_init(AVTEA *ctx, const uint8_t key[16], int rounds)
Initialize an AVTEA context.
int main(int argc, char **argv)
void * av_mallocz(size_t size)
Allocate a block of size bytes with alignment suitable for all memory accesses (including vectors if ...