1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/security/crypto/weakcrypto/source/symmetric/rijndael.cpp Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,464 @@
1.4 +/*
1.5 +* Copyright (c) 2002-2009 Nokia Corporation and/or its subsidiary(-ies).
1.6 +* All rights reserved.
1.7 +* This component and the accompanying materials are made available
1.8 +* under the terms of the License "Eclipse Public License v1.0"
1.9 +* which accompanies this distribution, and is available
1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +*
1.12 +* Initial Contributors:
1.13 +* Nokia Corporation - initial contribution.
1.14 +*
1.15 +* Contributors:
1.16 +*
1.17 +* Description:
1.18 +*
1.19 +*/
1.20 +
1.21 +
1.22 +#include "rijndael.h"
1.23 +#include "rijndaeltables.h"
1.24 +#include "../common/inlines.h"
1.25 +#include <cryptostrength.h>
1.26 +
1.27 +const TUint KAESKeyBytes128 = 16;
1.28 +const TUint KAESKeyBytes192 = 24;
1.29 +const TUint KAESKeyBytes256 = 32;
1.30 +const TUint KAESBlockBytes = 16;
1.31 +
1.32 +/* CRijndael */
1.33 +EXPORT_C CRijndael::CRijndael(void)
1.34 + {
1.35 + }
1.36 +
1.37 +void CRijndael::Reset()
1.38 + {
1.39 + SetKey(*iKey);
1.40 + }
1.41 +
1.42 +TInt CRijndael::KeySize() const
1.43 + {
1.44 + return (4*(iRounds+1));
1.45 + }
1.46 +
1.47 +CRijndael::~CRijndael()
1.48 + {
1.49 + delete iKey;
1.50 + }
1.51 +
1.52 +void CRijndael::ConstructL(const TDesC8& aKey)
1.53 + {
1.54 + TUint keySize = aKey.Size();
1.55 + assert((keySize==KAESKeyBytes128)||(keySize==KAESKeyBytes192)||(keySize==KAESKeyBytes256));
1.56 + iKey = aKey.AllocL();
1.57 + iRounds = keySize/4 + 6;
1.58 + SetKey(aKey);
1.59 + }
1.60 +
1.61 +void CRijndael::SetKey(const TDesC8& aKey)
1.62 + {
1.63 + TUint keySize = aKey.Size();
1.64 + TUint32 temp;
1.65 + TUint32* rk = &iK[0];
1.66 +
1.67 + TUint i = 0;
1.68 +
1.69 + GetUserKeyBigEndian(rk, keySize/4, &aKey[0], keySize);
1.70 +
1.71 + switch(keySize)
1.72 + {
1.73 + case (KAESKeyBytes128):
1.74 + {
1.75 + FOREVER
1.76 + {
1.77 + temp = rk[3];
1.78 + rk[4] = rk[0] ^
1.79 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
1.80 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
1.81 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
1.82 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
1.83 + RIJNDAEL_TABLE::rcon[i];
1.84 + rk[5] = rk[1] ^ rk[4];
1.85 + rk[6] = rk[2] ^ rk[5];
1.86 + rk[7] = rk[3] ^ rk[6];
1.87 + if (++i == 10)
1.88 + break;
1.89 + rk += 4;
1.90 + }
1.91 + }
1.92 + break;
1.93 +
1.94 + case (KAESKeyBytes192):
1.95 + {
1.96 + FOREVER
1.97 + {
1.98 + temp = rk[ 5];
1.99 + rk[ 6] = rk[ 0] ^
1.100 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
1.101 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
1.102 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
1.103 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
1.104 + RIJNDAEL_TABLE::rcon[i];
1.105 + rk[ 7] = rk[ 1] ^ rk[ 6];
1.106 + rk[ 8] = rk[ 2] ^ rk[ 7];
1.107 + rk[ 9] = rk[ 3] ^ rk[ 8];
1.108 + if (++i == 8)
1.109 + break;
1.110 + rk[10] = rk[ 4] ^ rk[ 9];
1.111 + rk[11] = rk[ 5] ^ rk[10];
1.112 + rk += 6;
1.113 + }
1.114 + }
1.115 + break;
1.116 +
1.117 + case (KAESKeyBytes256):
1.118 + {
1.119 + FOREVER
1.120 + {
1.121 + temp = rk[ 7];
1.122 + rk[ 8] = rk[ 0] ^
1.123 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0xff000000) ^
1.124 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x00ff0000) ^
1.125 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x0000ff00) ^
1.126 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0x000000ff) ^
1.127 + RIJNDAEL_TABLE::rcon[i];
1.128 + rk[ 9] = rk[ 1] ^ rk[ 8];
1.129 + rk[10] = rk[ 2] ^ rk[ 9];
1.130 + rk[11] = rk[ 3] ^ rk[10];
1.131 + if (++i == 7)
1.132 + break;
1.133 + temp = rk[11];
1.134 + rk[12] = rk[ 4] ^
1.135 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 3)] & 0xff000000) ^
1.136 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 2)] & 0x00ff0000) ^
1.137 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 1)] & 0x0000ff00) ^
1.138 + (RIJNDAEL_TABLE::Te4[GETBYTE(temp, 0)] & 0x000000ff);
1.139 + rk[13] = rk[ 5] ^ rk[12];
1.140 + rk[14] = rk[ 6] ^ rk[13];
1.141 + rk[15] = rk[ 7] ^ rk[14];
1.142 +
1.143 + rk += 8;
1.144 + }
1.145 + }
1.146 + break;
1.147 +
1.148 + default:
1.149 + assert(0); // Shouldn't get here, keeps compiler happy
1.150 + }
1.151 + }
1.152 +
1.153 +
1.154 +/* CAESEncryptor */
1.155 +EXPORT_C CAESEncryptor* CAESEncryptor::NewL(const TDesC8& aKey)
1.156 + {
1.157 + CAESEncryptor* me = CAESEncryptor::NewLC(aKey);
1.158 + CleanupStack::Pop(me);
1.159 + return (me);
1.160 + }
1.161 +
1.162 +EXPORT_C CAESEncryptor* CAESEncryptor::NewLC(const TDesC8& aKey)
1.163 + {
1.164 + CAESEncryptor* me = new (ELeave) CAESEncryptor();
1.165 + CleanupStack::PushL(me);
1.166 + me->ConstructL(aKey);
1.167 + TCrypto::IsSymmetricWeakEnoughL(BytesToBits(aKey.Size()));
1.168 + return (me);
1.169 + }
1.170 +
1.171 +TInt CAESEncryptor::BlockSize() const
1.172 + {
1.173 + return KAESBlockBytes;
1.174 + }
1.175 +
1.176 +void CAESEncryptor::Transform(TDes8& aBlock)
1.177 + {
1.178 + assert((TUint)aBlock.Size()==KAESBlockBytes);
1.179 +
1.180 + TUint32 s0, s1, s2, s3, t0, t1, t2, t3;
1.181 + const TUint32* rk = &iK[0];
1.182 +
1.183 +/*
1.184 + * map byte array block to cipher state
1.185 + * and add initial round key:
1.186 +*/
1.187 + GetBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
1.188 + s0 ^= rk[0];
1.189 + s1 ^= rk[1];
1.190 + s2 ^= rk[2];
1.191 + s3 ^= rk[3];
1.192 +/*
1.193 + * Nr - 1 full rounds:
1.194 +*/
1.195 + TUint r = iRounds >> 1;
1.196 + FOREVER
1.197 + {
1.198 + t0 =
1.199 + RIJNDAEL_TABLE::Te0[GETBYTE(s0, 3)] ^
1.200 + RIJNDAEL_TABLE::Te1[GETBYTE(s1, 2)] ^
1.201 + RIJNDAEL_TABLE::Te2[GETBYTE(s2, 1)] ^
1.202 + RIJNDAEL_TABLE::Te3[GETBYTE(s3, 0)] ^
1.203 + rk[4];
1.204 + t1 =
1.205 + RIJNDAEL_TABLE::Te0[GETBYTE(s1, 3)] ^
1.206 + RIJNDAEL_TABLE::Te1[GETBYTE(s2, 2)] ^
1.207 + RIJNDAEL_TABLE::Te2[GETBYTE(s3, 1)] ^
1.208 + RIJNDAEL_TABLE::Te3[GETBYTE(s0, 0)] ^
1.209 + rk[5];
1.210 + t2 =
1.211 + RIJNDAEL_TABLE::Te0[GETBYTE(s2, 3)] ^
1.212 + RIJNDAEL_TABLE::Te1[GETBYTE(s3, 2)] ^
1.213 + RIJNDAEL_TABLE::Te2[GETBYTE(s0, 1)] ^
1.214 + RIJNDAEL_TABLE::Te3[GETBYTE(s1, 0)] ^
1.215 + rk[6];
1.216 + t3 =
1.217 + RIJNDAEL_TABLE::Te0[GETBYTE(s3, 3)] ^
1.218 + RIJNDAEL_TABLE::Te1[GETBYTE(s0, 2)] ^
1.219 + RIJNDAEL_TABLE::Te2[GETBYTE(s1, 1)] ^
1.220 + RIJNDAEL_TABLE::Te3[GETBYTE(s2, 0)] ^
1.221 + rk[7];
1.222 +
1.223 + rk += 8;
1.224 + if (--r == 0)
1.225 + break;
1.226 +
1.227 + s0 =
1.228 + RIJNDAEL_TABLE::Te0[GETBYTE(t0, 3)] ^
1.229 + RIJNDAEL_TABLE::Te1[GETBYTE(t1, 2)] ^
1.230 + RIJNDAEL_TABLE::Te2[GETBYTE(t2, 1)] ^
1.231 + RIJNDAEL_TABLE::Te3[GETBYTE(t3, 0)] ^
1.232 + rk[0];
1.233 + s1 =
1.234 + RIJNDAEL_TABLE::Te0[GETBYTE(t1, 3)] ^
1.235 + RIJNDAEL_TABLE::Te1[GETBYTE(t2, 2)] ^
1.236 + RIJNDAEL_TABLE::Te2[GETBYTE(t3, 1)] ^
1.237 + RIJNDAEL_TABLE::Te3[GETBYTE(t0, 0)] ^
1.238 + rk[1];
1.239 + s2 =
1.240 + RIJNDAEL_TABLE::Te0[GETBYTE(t2, 3)] ^
1.241 + RIJNDAEL_TABLE::Te1[GETBYTE(t3, 2)] ^
1.242 + RIJNDAEL_TABLE::Te2[GETBYTE(t0, 1)] ^
1.243 + RIJNDAEL_TABLE::Te3[GETBYTE(t1, 0)] ^
1.244 + rk[2];
1.245 + s3 =
1.246 + RIJNDAEL_TABLE::Te0[GETBYTE(t3, 3)] ^
1.247 + RIJNDAEL_TABLE::Te1[GETBYTE(t0, 2)] ^
1.248 + RIJNDAEL_TABLE::Te2[GETBYTE(t1, 1)] ^
1.249 + RIJNDAEL_TABLE::Te3[GETBYTE(t2, 0)] ^
1.250 + rk[3];
1.251 + }
1.252 +/*
1.253 + * apply last round and
1.254 + * map cipher state to byte array block:
1.255 +*/
1.256 +
1.257 + s0 =
1.258 + (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 3)] & 0xff000000) ^
1.259 + (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 2)] & 0x00ff0000) ^
1.260 + (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 1)] & 0x0000ff00) ^
1.261 + (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 0)] & 0x000000ff) ^
1.262 + rk[0];
1.263 + s1 =
1.264 + (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 3)] & 0xff000000) ^
1.265 + (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 2)] & 0x00ff0000) ^
1.266 + (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 1)] & 0x0000ff00) ^
1.267 + (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 0)] & 0x000000ff) ^
1.268 + rk[1];
1.269 + s2 =
1.270 + (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 3)] & 0xff000000) ^
1.271 + (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 2)] & 0x00ff0000) ^
1.272 + (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 1)] & 0x0000ff00) ^
1.273 + (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 0)] & 0x000000ff) ^
1.274 + rk[2];
1.275 + s3 =
1.276 + (RIJNDAEL_TABLE::Te4[GETBYTE(t3, 3)] & 0xff000000) ^
1.277 + (RIJNDAEL_TABLE::Te4[GETBYTE(t0, 2)] & 0x00ff0000) ^
1.278 + (RIJNDAEL_TABLE::Te4[GETBYTE(t1, 1)] & 0x0000ff00) ^
1.279 + (RIJNDAEL_TABLE::Te4[GETBYTE(t2, 0)] & 0x000000ff) ^
1.280 + rk[3];
1.281 +
1.282 + PutBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
1.283 + }
1.284 +
1.285 +CAESEncryptor::CAESEncryptor(void)
1.286 + {
1.287 + }
1.288 +
1.289 +/* CAESDecryptor */
1.290 +EXPORT_C CAESDecryptor* CAESDecryptor::NewL(const TDesC8& aKey)
1.291 + {
1.292 + CAESDecryptor* me = CAESDecryptor::NewLC(aKey);
1.293 + CleanupStack::Pop(me);
1.294 + return (me);
1.295 + }
1.296 +
1.297 +
1.298 +EXPORT_C CAESDecryptor* CAESDecryptor::NewLC(const TDesC8& aKey)
1.299 + {
1.300 + CAESDecryptor* me = new (ELeave) CAESDecryptor();
1.301 + CleanupStack::PushL(me);
1.302 + me->ConstructL(aKey);
1.303 + TCrypto::IsSymmetricWeakEnoughL(BytesToBits(aKey.Size()));
1.304 + return (me);
1.305 + }
1.306 +
1.307 +TInt CAESDecryptor::BlockSize() const
1.308 + {
1.309 + return KAESBlockBytes;
1.310 + }
1.311 +
1.312 +void CAESDecryptor::Transform(TDes8& aBlock)
1.313 + {
1.314 + TUint32 s0, s1, s2, s3, t0, t1, t2, t3;
1.315 + const TUint32* rk = &iK[0];
1.316 +
1.317 +/*
1.318 + * map byte array block to cipher state
1.319 + * and add initial round key:
1.320 +*/
1.321 + GetBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
1.322 +
1.323 + s0 ^= rk[0];
1.324 + s1 ^= rk[1];
1.325 + s2 ^= rk[2];
1.326 + s3 ^= rk[3];
1.327 +/*
1.328 + * Nr - 1 full rounds:
1.329 +*/
1.330 + TUint r = iRounds >> 1;
1.331 + FOREVER
1.332 + {
1.333 + t0 =
1.334 + RIJNDAEL_TABLE::Td0[GETBYTE(s0, 3)] ^
1.335 + RIJNDAEL_TABLE::Td1[GETBYTE(s3, 2)] ^
1.336 + RIJNDAEL_TABLE::Td2[GETBYTE(s2, 1)] ^
1.337 + RIJNDAEL_TABLE::Td3[GETBYTE(s1, 0)] ^
1.338 + rk[4];
1.339 + t1 =
1.340 + RIJNDAEL_TABLE::Td0[GETBYTE(s1, 3)] ^
1.341 + RIJNDAEL_TABLE::Td1[GETBYTE(s0, 2)] ^
1.342 + RIJNDAEL_TABLE::Td2[GETBYTE(s3, 1)] ^
1.343 + RIJNDAEL_TABLE::Td3[GETBYTE(s2, 0)] ^
1.344 + rk[5];
1.345 + t2 =
1.346 + RIJNDAEL_TABLE::Td0[GETBYTE(s2, 3)] ^
1.347 + RIJNDAEL_TABLE::Td1[GETBYTE(s1, 2)] ^
1.348 + RIJNDAEL_TABLE::Td2[GETBYTE(s0, 1)] ^
1.349 + RIJNDAEL_TABLE::Td3[GETBYTE(s3, 0)] ^
1.350 + rk[6];
1.351 + t3 =
1.352 + RIJNDAEL_TABLE::Td0[GETBYTE(s3, 3)] ^
1.353 + RIJNDAEL_TABLE::Td1[GETBYTE(s2, 2)] ^
1.354 + RIJNDAEL_TABLE::Td2[GETBYTE(s1, 1)] ^
1.355 + RIJNDAEL_TABLE::Td3[GETBYTE(s0, 0)] ^
1.356 + rk[7];
1.357 +
1.358 + rk += 8;
1.359 + if (--r == 0)
1.360 + break;
1.361 +
1.362 + s0 =
1.363 + RIJNDAEL_TABLE::Td0[GETBYTE(t0, 3)] ^
1.364 + RIJNDAEL_TABLE::Td1[GETBYTE(t3, 2)] ^
1.365 + RIJNDAEL_TABLE::Td2[GETBYTE(t2, 1)] ^
1.366 + RIJNDAEL_TABLE::Td3[GETBYTE(t1, 0)] ^
1.367 + rk[0];
1.368 + s1 =
1.369 + RIJNDAEL_TABLE::Td0[GETBYTE(t1, 3)] ^
1.370 + RIJNDAEL_TABLE::Td1[GETBYTE(t0, 2)] ^
1.371 + RIJNDAEL_TABLE::Td2[GETBYTE(t3, 1)] ^
1.372 + RIJNDAEL_TABLE::Td3[GETBYTE(t2, 0)] ^
1.373 + rk[1];
1.374 + s2 =
1.375 + RIJNDAEL_TABLE::Td0[GETBYTE(t2, 3)] ^
1.376 + RIJNDAEL_TABLE::Td1[GETBYTE(t1, 2)] ^
1.377 + RIJNDAEL_TABLE::Td2[GETBYTE(t0, 1)] ^
1.378 + RIJNDAEL_TABLE::Td3[GETBYTE(t3, 0)] ^
1.379 + rk[2];
1.380 + s3 =
1.381 + RIJNDAEL_TABLE::Td0[GETBYTE(t3, 3)] ^
1.382 + RIJNDAEL_TABLE::Td1[GETBYTE(t2, 2)] ^
1.383 + RIJNDAEL_TABLE::Td2[GETBYTE(t1, 1)] ^
1.384 + RIJNDAEL_TABLE::Td3[GETBYTE(t0, 0)] ^
1.385 + rk[3];
1.386 + }
1.387 +/*
1.388 + * apply last round and
1.389 + * map cipher state to byte array block:
1.390 +*/
1.391 + s0 =
1.392 + (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 3)] & 0xff000000) ^
1.393 + (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 2)] & 0x00ff0000) ^
1.394 + (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 1)] & 0x0000ff00) ^
1.395 + (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 0)] & 0x000000ff) ^
1.396 + rk[0];
1.397 + s1 =
1.398 + (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 3)] & 0xff000000) ^
1.399 + (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 2)] & 0x00ff0000) ^
1.400 + (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 1)] & 0x0000ff00) ^
1.401 + (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 0)] & 0x000000ff) ^
1.402 + rk[1];
1.403 + s2 =
1.404 + (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 3)] & 0xff000000) ^
1.405 + (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 2)] & 0x00ff0000) ^
1.406 + (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 1)] & 0x0000ff00) ^
1.407 + (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 0)] & 0x000000ff) ^
1.408 + rk[2];
1.409 + s3 =
1.410 + (RIJNDAEL_TABLE::Td4[GETBYTE(t3, 3)] & 0xff000000) ^
1.411 + (RIJNDAEL_TABLE::Td4[GETBYTE(t2, 2)] & 0x00ff0000) ^
1.412 + (RIJNDAEL_TABLE::Td4[GETBYTE(t1, 1)] & 0x0000ff00) ^
1.413 + (RIJNDAEL_TABLE::Td4[GETBYTE(t0, 0)] & 0x000000ff) ^
1.414 + rk[3];
1.415 +
1.416 +
1.417 + PutBlockBigEndian((TUint8*)&aBlock[0], s0, s1, s2, s3);
1.418 + }
1.419 +
1.420 +
1.421 +void CAESDecryptor::SetKey(const TDesC8& aKey)
1.422 + {
1.423 + CRijndael::SetKey(aKey);
1.424 +
1.425 + TUint i, j;
1.426 + TUint32* rk = &iK[0];
1.427 + TUint32 temp;
1.428 +
1.429 +// invert the order of the round keys
1.430 + for (i = 0, j = 4*iRounds; i < j; i += 4, j -= 4)
1.431 + {
1.432 + temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp;
1.433 + temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
1.434 + temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
1.435 + temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
1.436 + }
1.437 +
1.438 +// apply the inverse MixColumn transform to all round keys but the first and the last
1.439 + for (i = 1; i < iRounds; i++)
1.440 + {
1.441 + rk += 4;
1.442 + rk[0] =
1.443 + RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 3)] & 0xff] ^
1.444 + RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 2)] & 0xff] ^
1.445 + RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 1)] & 0xff] ^
1.446 + RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[0], 0)] & 0xff];
1.447 + rk[1] =
1.448 + RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 3)] & 0xff] ^
1.449 + RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 2)] & 0xff] ^
1.450 + RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 1)] & 0xff] ^
1.451 + RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[1], 0)] & 0xff];
1.452 + rk[2] =
1.453 + RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 3)] & 0xff] ^
1.454 + RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 2)] & 0xff] ^
1.455 + RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 1)] & 0xff] ^
1.456 + RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[2], 0)] & 0xff];
1.457 + rk[3] =
1.458 + RIJNDAEL_TABLE::Td0[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 3)] & 0xff] ^
1.459 + RIJNDAEL_TABLE::Td1[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 2)] & 0xff] ^
1.460 + RIJNDAEL_TABLE::Td2[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 1)] & 0xff] ^
1.461 + RIJNDAEL_TABLE::Td3[RIJNDAEL_TABLE::Te4[GETBYTE(rk[3], 0)] & 0xff];
1.462 + }
1.463 + }
1.464 +
1.465 +CAESDecryptor::CAESDecryptor()
1.466 + {
1.467 + }