os/security/crypto/weakcrypto/source/symmetric/rijndael.cpp
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/security/crypto/weakcrypto/source/symmetric/rijndael.cpp	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,464 @@
     1.4 +/*
     1.5 +* Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
     1.6 +* All rights reserved.
     1.7 +* This component and the accompanying materials are made available
     1.8 +* under the terms of the License "Eclipse Public License v1.0"
     1.9 +* which accompanies this distribution, and is available
    1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.11 +*
    1.12 +* Initial Contributors:
    1.13 +* Nokia Corporation - initial contribution.
    1.14 +*
    1.15 +* Contributors:
    1.16 +*
    1.17 +* Description: 
    1.18 +*
    1.19 +*/
    1.20 +
    1.21 +
    1.22 +#include "rijndael.h"
    1.23 +#include "rijndaeltables.h"
    1.24 +#include "../common/inlines.h"
    1.25 +#include <cryptostrength.h>
    1.26 +
    1.27 +const TUint KAESKeyBytes128 = 16;
    1.28 +const TUint KAESKeyBytes192 = 24;
    1.29 +const TUint KAESKeyBytes256 = 32;
    1.30 +const TUint KAESBlockBytes = 16;
    1.31 +
    1.32 +/* CRijndael */
    1.33 +EXPORT_C CRijndael::CRijndael(void)
    1.34 +	{
    1.35 +	}
    1.36 +
    1.37 +void CRijndael::Reset()
    1.38 +	{
    1.39 +	SetKey(*iKey);
    1.40 +	}
    1.41 +
    1.42 +TInt CRijndael::KeySize() const
    1.43 +	{
    1.44 +	return (4*(iRounds+1));
    1.45 +	}
    1.46 +
    1.47 +CRijndael::~CRijndael()
    1.48 +	{
    1.49 +	delete iKey;
    1.50 +	}
    1.51 +
    1.52 +void CRijndael::ConstructL(const TDesC8& aKey)
    1.53 +	{
    1.54 +	TUint keySize = aKey.Size();
    1.55 +	assert((keySize==KAESKeyBytes128)||(keySize==KAESKeyBytes192)||(keySize==KAESKeyBytes256));
    1.56 +	iKey = aKey.AllocL();
    1.57 +	iRounds = keySize/4 + 6;
    1.58 +	SetKey(aKey);
    1.59 +	}
    1.60 +
    1.61 +void CRijndael::SetKey(const TDesC8& aKey)
    1.62 +	{
    1.63 +	TUint keySize = aKey.Size();
    1.64 +	TUint32 temp; 
    1.65 +	TUint32* rk = &iK[0];
    1.66 +
    1.67 +	TUint i = 0;
    1.68 +
    1.69 +	GetUserKeyBigEndian(rk, keySize/4, &aKey[0], keySize);
    1.70 +
    1.71 +	switch(keySize)
    1.72 +		{
    1.73 +		case (KAESKeyBytes128):
    1.74 +			{
    1.75 +			FOREVER
    1.76 +				{
    1.77 +				temp  = rk[3];
    1.78 +				rk[4] = rk[0] ^
    1.79 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
    1.80 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
    1.81 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
    1.82 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
    1.83 +					RIJNDAEL_TABLE::rcon[i];
    1.84 +				rk[5] = rk[1] ^ rk[4];
    1.85 +				rk[6] = rk[2] ^ rk[5];
    1.86 +				rk[7] = rk[3] ^ rk[6];
    1.87 +				if (++i == 10)
    1.88 +					break;
    1.89 +				rk += 4;
    1.90 +				}
    1.91 +			}
    1.92 +		break;
    1.93 +
    1.94 +		case (KAESKeyBytes192):
    1.95 +			{
    1.96 +			FOREVER
    1.97 +				{
    1.98 +				temp = rk[ 5];
    1.99 +				rk[ 6] = rk[ 0] ^
   1.100 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
   1.101 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
   1.102 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
   1.103 +					(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
   1.104 +					RIJNDAEL_TABLE::rcon[i];
   1.105 +				rk[ 7] = rk[ 1] ^ rk[ 6];
   1.106 +				rk[ 8] = rk[ 2] ^ rk[ 7];
   1.107 +				rk[ 9] = rk[ 3] ^ rk[ 8];
   1.108 +				if (++i == 8)
   1.109 +					break;
   1.110 +				rk[10] = rk[ 4] ^ rk[ 9];
   1.111 +				rk[11] = rk[ 5] ^ rk[10];
   1.112 +				rk += 6;
   1.113 +				}
   1.114 +			}
   1.115 +		break;
   1.116 +
   1.117 +		case (KAESKeyBytes256):
   1.118 +			{
   1.119 +			FOREVER
   1.120 +				{
   1.121 +        		temp = rk[ 7];
   1.122 +        		rk[ 8] = rk[ 0] ^
   1.123 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
   1.124 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
   1.125 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
   1.126 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
   1.127 +        			RIJNDAEL_TABLE::rcon[i];
   1.128 +        		rk[ 9] = rk[ 1] ^ rk[ 8];
   1.129 +        		rk[10] = rk[ 2] ^ rk[ 9];
   1.130 +        		rk[11] = rk[ 3] ^ rk[10];
   1.131 +				if (++i == 7)
   1.132 +					break;
   1.133 +        		temp = rk[11];
   1.134 +        		rk[12] = rk[ 4] ^
   1.135 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0xff000000) ^
   1.136 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0x00ff0000) ^
   1.137 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x0000ff00) ^
   1.138 +        			(RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x000000ff);
   1.139 +        		rk[13] = rk[ 5] ^ rk[12];
   1.140 +        		rk[14] = rk[ 6] ^ rk[13];
   1.141 +        		rk[15] = rk[ 7] ^ rk[14];
   1.142 +
   1.143 +				rk += 8;
   1.144 +				}
   1.145 +			}
   1.146 +		break;
   1.147 +
   1.148 +		default:
   1.149 +			assert(0);	//	Shouldn't get here, keeps compiler happy
   1.150 +		}
   1.151 +	}
   1.152 +
   1.153 +
   1.154 +/* CAESEncryptor */
   1.155 +EXPORT_C CAESEncryptor* CAESEncryptor::NewL(const TDesC8& aKey)
   1.156 +	{
   1.157 +	CAESEncryptor* me = CAESEncryptor::NewLC(aKey);
   1.158 +	CleanupStack::Pop(me);
   1.159 +	return (me);
   1.160 +	}
   1.161 +
   1.162 +EXPORT_C CAESEncryptor* CAESEncryptor::NewLC(const TDesC8& aKey)
   1.163 +	{
   1.164 +	CAESEncryptor* me = new (ELeave) CAESEncryptor();
   1.165 +	CleanupStack::PushL(me);
   1.166 +	me->ConstructL(aKey);
   1.167 +	TCrypto::IsSymmetricWeakEnoughL(BytesToBits(aKey.Size()));
   1.168 +	return (me);
   1.169 +	}
   1.170 +
   1.171 +TInt CAESEncryptor::BlockSize() const
   1.172 +	{
   1.173 +	return KAESBlockBytes;
   1.174 +	}
   1.175 +
   1.176 +void CAESEncryptor::Transform(TDes8& aBlock)
   1.177 +	{
   1.178 +	assert((TUint)aBlock.Size()==KAESBlockBytes);
   1.179 +	
   1.180 +	TUint32 s0, s1, s2, s3, t0, t1, t2, t3;
   1.181 +	const TUint32* rk = &iK[0];
   1.182 +
   1.183 +/*
   1.184 + *	map byte array block to cipher state
   1.185 + *	and add initial round key:
   1.186 +*/
   1.187 +	GetBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
   1.188 +	s0 ^= rk[0];
   1.189 +	s1 ^= rk[1];
   1.190 +	s2 ^= rk[2];
   1.191 +	s3 ^= rk[3];
   1.192 +/*
   1.193 + *	Nr - 1 full rounds:
   1.194 +*/
   1.195 +    TUint r = iRounds >> 1;
   1.196 +	FOREVER
   1.197 +		{
   1.198 +        t0 =
   1.199 +            RIJNDAEL_TABLE::Te0[GETBYTE(s0, 3)] ^
   1.200 +            RIJNDAEL_TABLE::Te1[GETBYTE(s1, 2)] ^
   1.201 +            RIJNDAEL_TABLE::Te2[GETBYTE(s2, 1)] ^
   1.202 +            RIJNDAEL_TABLE::Te3[GETBYTE(s3, 0)] ^
   1.203 +            rk[4];
   1.204 +        t1 =
   1.205 +            RIJNDAEL_TABLE::Te0[GETBYTE(s1, 3)] ^
   1.206 +            RIJNDAEL_TABLE::Te1[GETBYTE(s2, 2)] ^
   1.207 +            RIJNDAEL_TABLE::Te2[GETBYTE(s3, 1)] ^
   1.208 +            RIJNDAEL_TABLE::Te3[GETBYTE(s0, 0)] ^
   1.209 +            rk[5];
   1.210 +        t2 =
   1.211 +            RIJNDAEL_TABLE::Te0[GETBYTE(s2, 3)] ^
   1.212 +            RIJNDAEL_TABLE::Te1[GETBYTE(s3, 2)] ^
   1.213 +            RIJNDAEL_TABLE::Te2[GETBYTE(s0, 1)] ^
   1.214 +            RIJNDAEL_TABLE::Te3[GETBYTE(s1, 0)] ^
   1.215 +            rk[6];
   1.216 +        t3 =
   1.217 +            RIJNDAEL_TABLE::Te0[GETBYTE(s3, 3)] ^
   1.218 +            RIJNDAEL_TABLE::Te1[GETBYTE(s0, 2)] ^
   1.219 +            RIJNDAEL_TABLE::Te2[GETBYTE(s1, 1)] ^
   1.220 +            RIJNDAEL_TABLE::Te3[GETBYTE(s2, 0)] ^
   1.221 +            rk[7];
   1.222 +
   1.223 +        rk += 8;
   1.224 +        if (--r == 0) 
   1.225 +			break;
   1.226 +        
   1.227 +        s0 =
   1.228 +            RIJNDAEL_TABLE::Te0[GETBYTE(t0, 3)] ^
   1.229 +            RIJNDAEL_TABLE::Te1[GETBYTE(t1, 2)] ^
   1.230 +            RIJNDAEL_TABLE::Te2[GETBYTE(t2, 1)] ^
   1.231 +            RIJNDAEL_TABLE::Te3[GETBYTE(t3, 0)] ^
   1.232 +            rk[0];
   1.233 +        s1 =
   1.234 +            RIJNDAEL_TABLE::Te0[GETBYTE(t1, 3)] ^
   1.235 +            RIJNDAEL_TABLE::Te1[GETBYTE(t2, 2)] ^
   1.236 +            RIJNDAEL_TABLE::Te2[GETBYTE(t3, 1)] ^
   1.237 +            RIJNDAEL_TABLE::Te3[GETBYTE(t0, 0)] ^
   1.238 +            rk[1];
   1.239 +        s2 =
   1.240 +            RIJNDAEL_TABLE::Te0[GETBYTE(t2, 3)] ^
   1.241 +            RIJNDAEL_TABLE::Te1[GETBYTE(t3, 2)] ^
   1.242 +            RIJNDAEL_TABLE::Te2[GETBYTE(t0, 1)] ^
   1.243 +            RIJNDAEL_TABLE::Te3[GETBYTE(t1, 0)] ^
   1.244 +            rk[2];
   1.245 +        s3 =
   1.246 +            RIJNDAEL_TABLE::Te0[GETBYTE(t3, 3)] ^
   1.247 +            RIJNDAEL_TABLE::Te1[GETBYTE(t0, 2)] ^
   1.248 +            RIJNDAEL_TABLE::Te2[GETBYTE(t1, 1)] ^
   1.249 +            RIJNDAEL_TABLE::Te3[GETBYTE(t2, 0)] ^
   1.250 +            rk[3];
   1.251 +		}
   1.252 +/*
   1.253 + *	apply last round and
   1.254 + *	map cipher state to byte array block:
   1.255 +*/
   1.256 +
   1.257 +	s0 =
   1.258 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t0, 3)] & 0xff000000) ^
   1.259 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t1, 2)] & 0x00ff0000) ^
   1.260 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t2, 1)] & 0x0000ff00) ^
   1.261 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t3, 0)] & 0x000000ff) ^
   1.262 +		rk[0];
   1.263 +	s1 =
   1.264 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t1, 3)] & 0xff000000) ^
   1.265 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t2, 2)] & 0x00ff0000) ^
   1.266 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t3, 1)] & 0x0000ff00) ^
   1.267 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t0, 0)] & 0x000000ff) ^
   1.268 +		rk[1];
   1.269 +	s2 =
   1.270 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t2, 3)] & 0xff000000) ^
   1.271 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t3, 2)] & 0x00ff0000) ^
   1.272 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t0, 1)] & 0x0000ff00) ^
   1.273 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t1, 0)] & 0x000000ff) ^
   1.274 +		rk[2];
   1.275 +	s3 =
   1.276 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t3, 3)] & 0xff000000) ^
   1.277 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t0, 2)] & 0x00ff0000) ^
   1.278 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t1, 1)] & 0x0000ff00) ^
   1.279 +		(RIJNDAEL_TABLE::Te4[GETBYTE(t2, 0)] & 0x000000ff) ^
   1.280 +		rk[3];
   1.281 +
   1.282 +	PutBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
   1.283 +	}
   1.284 +
   1.285 +CAESEncryptor::CAESEncryptor(void)
   1.286 +	{
   1.287 +	}
   1.288 +
   1.289 +/* CAESDecryptor */
   1.290 +EXPORT_C CAESDecryptor* CAESDecryptor::NewL(const TDesC8& aKey)
   1.291 +	{
   1.292 +	CAESDecryptor* me = CAESDecryptor::NewLC(aKey);
   1.293 +	CleanupStack::Pop(me);
   1.294 +	return (me);
   1.295 +	}
   1.296 +
   1.297 +
   1.298 +EXPORT_C CAESDecryptor* CAESDecryptor::NewLC(const TDesC8& aKey)
   1.299 +	{
   1.300 +	CAESDecryptor* me = new (ELeave) CAESDecryptor();
   1.301 +	CleanupStack::PushL(me);
   1.302 +	me->ConstructL(aKey);
   1.303 +	TCrypto::IsSymmetricWeakEnoughL(BytesToBits(aKey.Size()));
   1.304 +	return (me);
   1.305 +	}
   1.306 +
   1.307 +TInt CAESDecryptor::BlockSize() const
   1.308 +	{
   1.309 +	return KAESBlockBytes;
   1.310 +	}
   1.311 +
   1.312 +void CAESDecryptor::Transform(TDes8& aBlock)
   1.313 +	{
   1.314 +	TUint32 s0, s1, s2, s3, t0, t1, t2, t3;
   1.315 +    const TUint32* rk = &iK[0];
   1.316 +
   1.317 +/*
   1.318 + *	map byte array block to cipher state
   1.319 + *	and add initial round key:
   1.320 +*/
   1.321 +	GetBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
   1.322 +
   1.323 +	s0 ^= rk[0];
   1.324 +	s1 ^= rk[1];
   1.325 +	s2 ^= rk[2];
   1.326 +	s3 ^= rk[3];
   1.327 +/*
   1.328 + *	Nr - 1 full rounds:
   1.329 +*/
   1.330 +    TUint r = iRounds >> 1;
   1.331 +    FOREVER
   1.332 +		{
   1.333 +        t0 =
   1.334 +            RIJNDAEL_TABLE::Td0[GETBYTE(s0, 3)] ^
   1.335 +            RIJNDAEL_TABLE::Td1[GETBYTE(s3, 2)] ^
   1.336 +            RIJNDAEL_TABLE::Td2[GETBYTE(s2, 1)] ^
   1.337 +            RIJNDAEL_TABLE::Td3[GETBYTE(s1, 0)] ^
   1.338 +            rk[4];
   1.339 +        t1 =
   1.340 +            RIJNDAEL_TABLE::Td0[GETBYTE(s1, 3)] ^
   1.341 +            RIJNDAEL_TABLE::Td1[GETBYTE(s0, 2)] ^
   1.342 +            RIJNDAEL_TABLE::Td2[GETBYTE(s3, 1)] ^
   1.343 +            RIJNDAEL_TABLE::Td3[GETBYTE(s2, 0)] ^
   1.344 +            rk[5];
   1.345 +        t2 =
   1.346 +            RIJNDAEL_TABLE::Td0[GETBYTE(s2, 3)] ^
   1.347 +            RIJNDAEL_TABLE::Td1[GETBYTE(s1, 2)] ^
   1.348 +            RIJNDAEL_TABLE::Td2[GETBYTE(s0, 1)] ^
   1.349 +            RIJNDAEL_TABLE::Td3[GETBYTE(s3, 0)] ^
   1.350 +            rk[6];
   1.351 +        t3 =
   1.352 +            RIJNDAEL_TABLE::Td0[GETBYTE(s3, 3)] ^
   1.353 +            RIJNDAEL_TABLE::Td1[GETBYTE(s2, 2)] ^
   1.354 +            RIJNDAEL_TABLE::Td2[GETBYTE(s1, 1)] ^
   1.355 +            RIJNDAEL_TABLE::Td3[GETBYTE(s0, 0)] ^
   1.356 +            rk[7];
   1.357 +
   1.358 +        rk += 8;
   1.359 +        if (--r == 0)
   1.360 +            break;
   1.361 +        
   1.362 +        s0 =
   1.363 +            RIJNDAEL_TABLE::Td0[GETBYTE(t0, 3)] ^
   1.364 +            RIJNDAEL_TABLE::Td1[GETBYTE(t3, 2)] ^
   1.365 +            RIJNDAEL_TABLE::Td2[GETBYTE(t2, 1)] ^
   1.366 +            RIJNDAEL_TABLE::Td3[GETBYTE(t1, 0)] ^
   1.367 +            rk[0];
   1.368 +        s1 =
   1.369 +            RIJNDAEL_TABLE::Td0[GETBYTE(t1, 3)] ^
   1.370 +            RIJNDAEL_TABLE::Td1[GETBYTE(t0, 2)] ^
   1.371 +            RIJNDAEL_TABLE::Td2[GETBYTE(t3, 1)] ^
   1.372 +            RIJNDAEL_TABLE::Td3[GETBYTE(t2, 0)] ^
   1.373 +            rk[1];
   1.374 +        s2 =
   1.375 +            RIJNDAEL_TABLE::Td0[GETBYTE(t2, 3)] ^
   1.376 +            RIJNDAEL_TABLE::Td1[GETBYTE(t1, 2)] ^
   1.377 +            RIJNDAEL_TABLE::Td2[GETBYTE(t0, 1)] ^
   1.378 +            RIJNDAEL_TABLE::Td3[GETBYTE(t3, 0)] ^
   1.379 +            rk[2];
   1.380 +        s3 =
   1.381 +            RIJNDAEL_TABLE::Td0[GETBYTE(t3, 3)] ^
   1.382 +            RIJNDAEL_TABLE::Td1[GETBYTE(t2, 2)] ^
   1.383 +            RIJNDAEL_TABLE::Td2[GETBYTE(t1, 1)] ^
   1.384 +            RIJNDAEL_TABLE::Td3[GETBYTE(t0, 0)] ^
   1.385 +            rk[3];
   1.386 +		}
   1.387 +/*
   1.388 + *	apply last round and
   1.389 + *	map cipher state to byte array block:
   1.390 +*/
   1.391 +   	s0 =
   1.392 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t0, 3)] & 0xff000000) ^
   1.393 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t3, 2)] & 0x00ff0000) ^
   1.394 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t2, 1)] & 0x0000ff00) ^
   1.395 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t1, 0)] & 0x000000ff) ^
   1.396 +   		rk[0];
   1.397 +   	s1 =
   1.398 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t1, 3)] & 0xff000000) ^
   1.399 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t0, 2)] & 0x00ff0000) ^
   1.400 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t3, 1)] & 0x0000ff00) ^
   1.401 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t2, 0)] & 0x000000ff) ^
   1.402 +   		rk[1];
   1.403 +   	s2 =
   1.404 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t2, 3)] & 0xff000000) ^
   1.405 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t1, 2)] & 0x00ff0000) ^
   1.406 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t0, 1)] & 0x0000ff00) ^
   1.407 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t3, 0)] & 0x000000ff) ^
   1.408 +   		rk[2];
   1.409 +   	s3 =
   1.410 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t3, 3)] & 0xff000000) ^
   1.411 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t2, 2)] & 0x00ff0000) ^
   1.412 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t1, 1)] & 0x0000ff00) ^
   1.413 +   		(RIJNDAEL_TABLE::Td4[GETBYTE(t0, 0)] & 0x000000ff) ^
   1.414 +   		rk[3];
   1.415 +
   1.416 +	
   1.417 +	PutBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
   1.418 +	}
   1.419 +
   1.420 +
   1.421 +void CAESDecryptor::SetKey(const TDesC8& aKey)
   1.422 +	{
   1.423 +	CRijndael::SetKey(aKey);
   1.424 +
   1.425 +	TUint i, j;
   1.426 +	TUint32* rk = &iK[0];
   1.427 +	TUint32 temp;
   1.428 +
   1.429 +//	invert the order of the round keys 
   1.430 +	for (i = 0, j = 4*iRounds; i < j; i += 4, j -= 4)
   1.431 +		{
   1.432 +		temp = rk[i    ]; rk[i    ] = rk[j    ]; rk[j    ] = temp;
   1.433 +		temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
   1.434 +		temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
   1.435 +		temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
   1.436 +		}
   1.437 +
   1.438 +//	apply the inverse MixColumn transform to all round keys but the first and the last
   1.439 +	for (i = 1; i < iRounds; i++)
   1.440 +		{
   1.441 +		rk += 4;
   1.442 +		rk[0] =
   1.443 +			RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 3)] & 0xff] ^
   1.444 +			RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 2)] & 0xff] ^
   1.445 +			RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 1)] & 0xff] ^
   1.446 +			RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 0)] & 0xff];
   1.447 +		rk[1] =
   1.448 +			RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 3)] & 0xff] ^
   1.449 +			RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 2)] & 0xff] ^
   1.450 +			RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 1)] & 0xff] ^
   1.451 +			RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 0)] & 0xff];
   1.452 +		rk[2] =
   1.453 +			RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 3)] & 0xff] ^
   1.454 +			RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 2)] & 0xff] ^
   1.455 +			RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 1)] & 0xff] ^
   1.456 +			RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 0)] & 0xff];
   1.457 +		rk[3] =
   1.458 +			RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 3)] & 0xff] ^
   1.459 +			RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 2)] & 0xff] ^
   1.460 +			RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 1)] & 0xff] ^
   1.461 +			RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 0)] & 0xff];
   1.462 +		}
   1.463 +	}
   1.464 +
   1.465 +CAESDecryptor::CAESDecryptor()
   1.466 +	{	
   1.467 +	}