aboutsummaryrefslogtreecommitdiffstats
path: root/epan/crypt
diff options
context:
space:
mode:
authorGerald Combs <gerald@wireshark.org>2006-12-28 17:22:12 +0000
committerGerald Combs <gerald@wireshark.org>2006-12-28 17:22:12 +0000
commitbd282b4114be8c7060fbc3873a04b80ec18317b8 (patch)
treeef14ce379885a746930a9839b20bebb530b35d04 /epan/crypt
parent60180815a6a70d264fdf4f6ff9f49eeb1a7c6742 (diff)
Move the contents of airpdcap to epan/crypt. Try to fix the current
distcheck failure. Move the nmake build targets for airpdcap from epan/dissectors to epan. This will probably break the Windows build. svn path=/trunk/; revision=20231
Diffstat (limited to 'epan/crypt')
-rw-r--r--epan/crypt/Makefile.am44
-rw-r--r--epan/crypt/Makefile.common49
-rw-r--r--epan/crypt/Makefile.nmake58
-rw-r--r--epan/crypt/airpdcap.c1333
-rw-r--r--epan/crypt/airpdcap_ccmp.c245
-rw-r--r--epan/crypt/airpdcap_ccmp.h0
-rw-r--r--epan/crypt/airpdcap_debug.c21
-rw-r--r--epan/crypt/airpdcap_debug.h70
-rw-r--r--epan/crypt/airpdcap_int.h113
-rw-r--r--epan/crypt/airpdcap_interop.h64
-rw-r--r--epan/crypt/airpdcap_md5.c450
-rw-r--r--epan/crypt/airpdcap_md5.h0
-rw-r--r--epan/crypt/airpdcap_rijndael.c1080
-rw-r--r--epan/crypt/airpdcap_rijndael.h68
-rw-r--r--epan/crypt/airpdcap_sha1.c343
-rw-r--r--epan/crypt/airpdcap_sha1.h28
-rw-r--r--epan/crypt/airpdcap_system.h350
-rw-r--r--epan/crypt/airpdcap_tkip.c250
-rw-r--r--epan/crypt/airpdcap_tkip.h0
-rw-r--r--epan/crypt/airpdcap_user.h167
-rw-r--r--epan/crypt/airpdcap_wep.c67
-rw-r--r--epan/crypt/airpdcap_wep.h78
-rw-r--r--epan/crypt/airpdcap_ws.h7
23 files changed, 4885 insertions, 0 deletions
diff --git a/epan/crypt/Makefile.am b/epan/crypt/Makefile.am
new file mode 100644
index 0000000000..fc50901c83
--- /dev/null
+++ b/epan/crypt/Makefile.am
@@ -0,0 +1,44 @@
+# Makefile.am
+# Automake file for the airpdcap for Wireshark
+#
+# $Id$
+#
+# Wireshark - Network traffic analyzer
+# By Gerald Combs <gerald@xxxxxxxxxxxxx>
+# Copyright 1998 Gerald Combs
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+
+include Makefile.common
+
+noinst_LIBRARIES = \
+ libairpdcap.a
+
+DISTCLEANFILES = \
+ libairpdcap.a
+
+CLEANFILES = \
+ libairpdcap.a \
+ *~
+
+MAINTAINERCLEANFILES = \
+ Makefile.in
+
+libairpdcap_a_SOURCES = \
+ $(LIBAIRPDCAP_SRC) \
+ $(LIBAIRPDCAP_INCLUDES)
+
+EXTRA_DIST = \
+ Makefile.nmake
diff --git a/epan/crypt/Makefile.common b/epan/crypt/Makefile.common
new file mode 100644
index 0000000000..bcf3d28c9e
--- /dev/null
+++ b/epan/crypt/Makefile.common
@@ -0,0 +1,49 @@
+# Makefile.common
+# Contains the stuff from Makefile.am and Makefile.nmake that is
+# a) common to both files and
+# b) portable between both files
+#
+# $Id: Makefile.common,v 1.1 2006/12/18 18:09:51 davides Exp $
+#
+# Wireshark - Network traffic analyzer
+# By Gerald Combs <gerald@wireshark.org>
+# Copyright 1998 Gerald Combs
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+
+LIBAIRPDCAP_SRC = \
+ airpdcap.c \
+ airpdcap_ccmp.c \
+ airpdcap_debug.c \
+ airpdcap_md5.c \
+ airpdcap_rijndael.c \
+ airpdcap_sha1.c \
+ airpdcap_tkip.c \
+ airpdcap_wep.c
+
+LIBAIRPDCAP_INCLUDES = \
+ airpdcap_ccmp.h \
+ airpdcap_debug.h \
+ airpdcap_interop.h \
+ airpdcap_int.h \
+ airpdcap_md5.h \
+ airpdcap_rijndael.h \
+ airpdcap_sha1.h \
+ airpdcap_system.h \
+ airpdcap_tkip.h \
+ airpdcap_user.h \
+ airpdcap_wep.h \
+ airpdcap_ws.h \
+ wep-wpadefs.h
diff --git a/epan/crypt/Makefile.nmake b/epan/crypt/Makefile.nmake
new file mode 100644
index 0000000000..e2f5f4bd54
--- /dev/null
+++ b/epan/crypt/Makefile.nmake
@@ -0,0 +1,58 @@
+## Makefile for building codecs.lib with Microsoft C and nmake
+## Use: $(MAKE) /$(MAKEFLAGS) -f makefile.nmake
+#
+# $Id$
+
+include ..\config.nmake
+
+############### no need to modify below this line #########
+
+CFLAGS=-DHAVE_CONFIG_H $(GLIB_CFLAGS) -D_U_="" $(LOCAL_CFLAGS)
+
+.c.obj::
+ $(CC) $(CFLAGS) -Fd.\ -c $<
+
+AIRPDCAP_OBJECTS= \
+ airpdcap.obj \
+ airpdcap_debug.obj \
+ airpdcap_ccmp.obj \
+ airpdcap_md5.obj \
+ airpdcap_rijndael.obj \
+ airpdcap_sha1.obj \
+ airpdcap_tkip.obj \
+ airpdcap_wep.obj \
+
+
+airpdcap.lib: $(AIRPDCAP_OBJECTS)
+ link /lib /out:airpdcap.lib $(AIRPDCAP_OBJECTS)
+
+airpdcap.obj: airpdcap.c
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap.c -o $@
+
+airpdcap_debug.obj: airpdcap_debug.c
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap_debug.c -o $@
+
+airpdcap_ccmp.obj: airpdcap_ccmp.c airpdcap_ccmp.h
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap_ccmp.c -o $@
+
+airpdcap_md5.obj: airpdcap_md5.c airpdcap_md5.h
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap_md5.c -o $@
+
+airpdcap_rijndael.obj: airpdcap_rijndael.c
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap_rijndael.c -o $@
+
+airpdcap_sha1.obj: airpdcap_sha1.c
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap_sha1.c -o $@
+
+airpdcap_tkip.obj: airpdcap_tkip.c
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap_tkip.c -o $@
+
+airpdcap_wep.obj: airpdcap_wep.c
+ $(CC) $(CFLAGS) -Fd.\ -c airpdcap_wep.c -o $@
+
+clean:
+ rm -f $(AIRPDCAP_OBJECTS) airpdcap.lib *.pdb
+
+distclean: clean
+
+maintainer-clean: distclean
diff --git a/epan/crypt/airpdcap.c b/epan/crypt/airpdcap.c
new file mode 100644
index 0000000000..ce220ac472
--- /dev/null
+++ b/epan/crypt/airpdcap.c
@@ -0,0 +1,1333 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_system.h"
+#include "airpdcap_int.h"
+
+#include "airpdcap_wep.h"
+#include "airpdcap_sha1.h"
+
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Constant definitions */
+/* */
+#define AIRPDCAP_SHA_DIGEST_LEN 20
+
+/* EAPOL definitions */
+/**
+ * Length of the EAPOL-Key key confirmation key (KCK) used to calculate
+ * MIC over EAPOL frame and validate an EAPOL packet (128 bits)
+ */
+#define AIRPDCAP_WPA_KCK_LEN 16
+/**
+ *Offset of the Key MIC in the EAPOL packet body
+ */
+#define AIRPDCAP_WPA_MICKEY_OFFSET 77
+/**
+ * Maximum length of the EAPOL packet (it depends on the maximum MAC
+ * frame size)
+ */
+#define AIRPDCAP_WPA_MAX_EAPOL_LEN 4095
+/**
+ * EAPOL Key Descriptor Version 1, used for all EAPOL-Key frames to and
+ * from a STA when neither the group nor pairwise ciphers are CCMP for
+ * Key Descriptor 1.
+ * @note
+ * Defined in 802.11i-2004, page 78
+ */
+#define AIRPDCAP_WPA_KEY_VER_CCMP 1
+/**
+ * EAPOL Key Descriptor Version 2, used for all EAPOL-Key frames to and
+ * from a STA when either the pairwise or the group cipher is AES-CCMP
+ * for Key Descriptor 2.
+ * /note
+ * Defined in 802.11i-2004, page 78
+ */
+#define AIRPDCAP_WPA_KEY_VER_AES_CCMP 2
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Macro definitions */
+/* */
+extern const UINT32 crc32_table[256];
+#define CRC(crc, ch) (crc = (crc >> 8) ^ crc32_table[(crc ^ (ch)) & 0xff])
+
+#define AIRPDCAP_GET_TK(ptk) (ptk + 32)
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Type definitions */
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal function prototype declarations */
+/* */
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+/**
+ * It is a step of the PBKDF2 (specifically the PKCS #5 v2.0) defined in
+ * the RFC 2898 to derive a key (used as PMK in WPA)
+ * @param password [IN] pointer to a password (sequence of between 8 and
+ * 63 ASCII encoded characters)
+ * @param ssid [IN] pointer to the SSID string encoded in max 32 ASCII
+ * encoded characters
+ * @param iterations [IN] times to hash the password (4096 for WPA)
+ * @param count [IN] ???
+ * @param output [OUT] pointer to a preallocated buffer of
+ * AIRPDCAP_SHA_DIGEST_LEN characters that will contain a part of the key
+ */
+INT AirPDcapRsnaPwd2PskStep(
+ const CHAR *password,
+ const CHAR *ssid,
+ const size_t ssidLength,
+ const INT iterations,
+ const INT count,
+ UCHAR *output)
+ ;
+
+/**
+ * It calculates the passphrase-to-PSK mapping reccomanded for use with
+ * RSNAs. This implementation uses the PBKDF2 method defined in the RFC
+ * 2898.
+ * @param password [IN] pointer to a password (sequence of between 8 and
+ * 63 ASCII encoded characters)
+ * @param ssid [IN] pointer to the SSID string encoded in max 32 ASCII
+ * encoded characters
+ * @param output [OUT] calculated PSK (to use as PMK in WPA)
+ * @note
+ * Described in 802.11i-2004, page 165
+ */
+INT AirPDcapRsnaPwd2Psk(
+ const CHAR *password,
+ const CHAR *ssid,
+ const size_t ssidLength,
+ UCHAR *output)
+ ;
+
+INT AirPDcapRsnaMng(
+ UCHAR *decrypt_data,
+ size_t *decrypt_len,
+ PAIRPDCAP_KEY_ITEM key,
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ INT offset,
+ UINT8 fcsPresent)
+ ;
+
+INT AirPDcapWepMng(
+ PAIRPDCAP_CONTEXT ctx,
+ UCHAR *decrypt_data,
+ size_t *decrypt_len,
+ PAIRPDCAP_KEY_ITEM key,
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ INT offset,
+ UINT8 fcsPresent)
+ ;
+
+INT AirPDcapRsna4WHandshake(
+ PAIRPDCAP_CONTEXT ctx,
+ const UCHAR *data,
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ PAIRPDCAP_KEY_ITEM key,
+ INT offset)
+ ;
+/**
+ * It checks whether the specified key is corrected or not.
+ * @note
+ * For a standard WEP key the length will be changed to the standard
+ * length, and the type changed in a generic WEP key.
+ * @param key [IN] pointer to the key to validate
+ * @return
+ * - TRUE: the key contains valid fields and values
+ * - FALSE: the key has some invalid field or value
+ */
+INT AirPDcapValidateKey(
+ PAIRPDCAP_KEY_ITEM key)
+ ;
+
+INT AirPDcapRsnaMicCheck(
+ UCHAR *eapol,
+ const USHORT eapol_len,
+ const UCHAR KCK[AIRPDCAP_WPA_KCK_LEN],
+ const USHORT key_ver)
+ ;
+
+/**
+ * @param ctx [IN] pointer to the current context
+ * @param id [IN] id of the association (composed by BSSID and MAC of
+ * the station)
+ * @return
+ * - index of the Security Association structure if found
+ * - -1, if the specified addresses pair BSSID-STA MAC has not been found
+ */
+INT AirPDcapGetSa(
+ PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_SEC_ASSOCIATION_ID *id)
+ ;
+
+INT AirPDcapFreeSa(
+ PAIRPDCAP_CONTEXT ctx,
+ INT index) /* index of the structure to free */
+ ;
+
+INT AirPDcapStoreSa(
+ PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_SEC_ASSOCIATION_ID *id)
+ ;
+
+UCHAR * AirPDcapGetStaAddress(
+ PAIRPDCAP_MAC_FRAME frame)
+ ;
+
+UCHAR * AirPDcapGetBssidAddress(
+ PAIRPDCAP_MAC_FRAME frame)
+ ;
+
+void AirPDcapRsnaPrfX(
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ const UCHAR pmk[32],
+ const UCHAR snonce[32],
+ const INT x, /* for TKIP 512, for CCMP 384 */
+ UCHAR *ptk)
+ ;
+
+INT AirPDcapAlgCrc32(
+ UCHAR *buf,
+ size_t nr,
+ ULONG *cval)
+ ;
+
+#ifdef __cplusplus
+}
+#endif
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Exported function definitions */
+/* */
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+INT AirPDcapPacketProcess(
+ PAIRPDCAP_CONTEXT ctx,
+ const UCHAR *data,
+ const size_t len,
+ UCHAR *decrypt_data,
+ size_t *decrypt_len,
+ PAIRPDCAP_KEY_ITEM key,
+ UINT8 fcsPresent,
+ UINT8 radioTapPresent,
+ UINT8 mngHandshake,
+ UINT8 mngDecrypt)
+{
+ size_t mac_header_len;
+ UCHAR *address;
+ AIRPDCAP_SEC_ASSOCIATION_ID id;
+ INT index;
+ PAIRPDCAP_SEC_ASSOCIATION sa;
+ INT offset;
+ UINT16 bodyLength;
+
+#ifdef _DEBUG
+ CHAR msgbuf[255];
+#endif
+
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapPacketProcess");
+
+ if (ctx==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "NULL context", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapPacketProcess");
+ return AIRPDCAP_RET_UNSUCCESS;
+ }
+ if (data==NULL || len==0) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "NULL data or length=0", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapPacketProcess");
+ return AIRPDCAP_RET_UNSUCCESS;
+ }
+
+ if (radioTapPresent)
+ offset=AIRPDCAP_RADIOTAP_HEADER_LEN;
+ else
+ offset=0;
+
+ /* check if the packet is of data type */
+ /* TODO consider packets send on an ad-hoc net (QoS) */
+ if (AIRPDCAP_TYPE(data[offset])!=AIRPDCAP_TYPE_DATA) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "not data packet", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_NO_DATA;
+ }
+
+ /* check correct packet size, to avoid wrong elaboration of encryption algorithms */
+ mac_header_len=AIRPDCAP_HEADER_LEN(data[offset+1]);
+ if (len < (UINT)(mac_header_len+AIRPDCAP_CRYPTED_DATA_MINLEN)) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "minimum length violated", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_WRONG_DATA_SIZE;
+ }
+
+ /* get BSSID */
+ if ( (address=AirPDcapGetBssidAddress((PAIRPDCAP_MAC_FRAME)(data+offset))) != NULL) {
+ memcpy(id.bssid, address, AIRPDCAP_MAC_LEN);
+#ifdef _DEBUG
+ sprintf(msgbuf, "BSSID: %2X.%2X.%2X.%2X.%2X.%2X\t", id.bssid[0],id.bssid[1],id.bssid[2],id.bssid[3],id.bssid[4],id.bssid[5]);
+#endif
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", msgbuf, AIRPDCAP_DEBUG_LEVEL_3);
+ } else {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "BSSID not found", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_REQ_DATA;
+ }
+
+ /* get STA address */
+ if ( (address=AirPDcapGetStaAddress((PAIRPDCAP_MAC_FRAME)(data+offset))) != NULL) {
+ memcpy(id.sta, address, AIRPDCAP_MAC_LEN);
+#ifdef _DEBUG
+ sprintf(msgbuf, "ST_MAC: %2X.%2X.%2X.%2X.%2X.%2X\t", id.sta[0],id.sta[1],id.sta[2],id.sta[3],id.sta[4],id.sta[5]);
+#endif
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", msgbuf, AIRPDCAP_DEBUG_LEVEL_3);
+ } else {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "SA not found", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_REQ_DATA;
+ }
+
+ /* search for a cached Security Association for current BSSID and station MAC */
+ if ((index=AirPDcapGetSa(ctx, &id))==-1) {
+ /* create a new Security Association */
+ if ((index=AirPDcapStoreSa(ctx, &id))==-1) {
+ return AIRPDCAP_RET_UNSUCCESS;
+ }
+ }
+
+ /* get the Security Association structure */
+ sa=&ctx->sa[index];
+
+ /* cache offset in the packet data (to scan encryption data) */
+ offset+=AIRPDCAP_HEADER_LEN(data[offset+1]);
+
+ /* check if data is encrypted (use the WEP bit in the Frame Control field) */
+ if (AIRPDCAP_WEP(data[1])==0)
+ {
+ if (mngHandshake) {
+ /* data is sent in cleartext, check if is an authentication message or end the process */
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Unencrypted data", AIRPDCAP_DEBUG_LEVEL_3);
+
+ /* check if the packet as an LLC header and the packet is 802.1X authentication (IEEE 802.1X-2004, pg. 24) */
+ if (data[offset]==0xAA && /* DSAP=SNAP */
+ data[offset+1]==0xAA && /* SSAP=SNAP */
+ data[offset+2]==0x03 && /* Control field=Unnumbered frame */
+ data[offset+3]==0x00 && /* Org. code=encaps. Ethernet */
+ data[offset+4]==0x00 &&
+ data[offset+5]==0x00 &&
+ data[offset+6]==0x88 && /* Type: 802.1X authentication */
+ data[offset+7]==0x8E) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Authentication: EAPOL packet", AIRPDCAP_DEBUG_LEVEL_3);
+
+ /* skip LLC header */
+ offset+=8;
+
+ /* check the version of the EAPOL protocol used (IEEE 802.1X-2004, pg. 24) */
+ /* TODO EAPOL protocol version to check? */
+ /*if (data[offset]!=2) {
+ AIRPDCAP_DEBUG_PRINT_LINE("EAPOL protocol version not recognized", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_NO_VALID_HANDSHAKE;
+ }*/
+
+ /* check if the packet is a EAPOL-Key (0x03) (IEEE 802.1X-2004, pg. 25) */
+ if (data[offset+1]!=3) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Not EAPOL-Key", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_NO_VALID_HANDSHAKE;
+ }
+
+ /* get and check the body length (IEEE 802.1X-2004, pg. 25) */
+ bodyLength=ntohs(*(UINT16 *)(data+offset+2));
+ if (((len-offset-4)!=bodyLength && !fcsPresent) || ((len-offset-8)!=bodyLength && fcsPresent)) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "EAPOL body not valid (wrong length)", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_NO_VALID_HANDSHAKE;
+ }
+
+ /* skip EAPOL MPDU and go to the first byte of the body */
+ offset+=4;
+
+ /* check if the key descriptor type is valid (IEEE 802.1X-2004, pg. 27) */
+ if (/*data[offset]!=0x1 &&*/ /* RC4 Key Descriptor Type (deprecated) */
+ data[offset]!=0x2 && /* IEEE 802.11 Key Descriptor Type */
+ data[offset]!=0xFE) /* TODO what's this value??? */
+ {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Not valid key descriptor type", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_NO_VALID_HANDSHAKE;
+ }
+
+ /* start with descriptor body */
+ offset+=1;
+
+ /* manage the 4-way handshake to define the key */
+ return AirPDcapRsna4WHandshake(ctx, data, sa, key, offset);
+ } else {
+ /* cleartext message, not authentication */
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "No authentication data", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_NO_DATA_ENCRYPTED;
+ }
+ }
+ } else {
+ if (mngDecrypt) {
+
+ if (decrypt_data==NULL)
+ return AIRPDCAP_RET_UNSUCCESS;
+
+ /* create new header and data to modify */
+ *decrypt_len=len;
+ memcpy(decrypt_data, data, *decrypt_len);
+
+ /* encrypted data */
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Encrypted data", AIRPDCAP_DEBUG_LEVEL_3);
+
+ if (fcsPresent)
+ /* remove from next computation FCS */
+ *decrypt_len-=4;
+
+ /* check the Extension IV to distinguish between WEP encryption and WPA encryption */
+ /* refer to IEEE 802.11i-2004, 8.2.1.2, pag.35 for WEP, */
+ /* IEEE 802.11i-2004, 8.3.2.2, pag. 45 for TKIP, */
+ /* IEEE 802.11i-2004, 8.3.3.2, pag. 57 for CCMP */
+ if (AIRPDCAP_EXTIV(data[offset+3])==0) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "WEP encryption", AIRPDCAP_DEBUG_LEVEL_3);
+ return AirPDcapWepMng(ctx, decrypt_data, decrypt_len, key, sa, offset, fcsPresent);
+ } else {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "TKIP or CCMP encryption", AIRPDCAP_DEBUG_LEVEL_3);
+ return AirPDcapRsnaMng(decrypt_data, decrypt_len, key, sa, offset, fcsPresent);
+ }
+ }
+ }
+
+ return AIRPDCAP_RET_UNSUCCESS;
+}
+
+INT AirPDcapSetKeys(
+ PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_KEY_ITEM keys[],
+ const size_t keys_nr)
+{
+ INT i;
+ INT success;
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapSetKeys");
+
+ if (ctx==NULL || keys==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "NULL context or NULL keys array", AIRPDCAP_DEBUG_LEVEL_3);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapSetKeys");
+ return 0;
+ }
+
+ if (keys_nr>AIRPDCAP_MAX_KEYS_NR) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Keys number greater than maximum", AIRPDCAP_DEBUG_LEVEL_3);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapSetKeys");
+ return 0;
+ }
+
+ /* clean keys collection before setting new ones */
+ AirPDcapCleanKeys(ctx);
+
+ /* check and insert keys */
+ for (i=0, success=0; i<(INT)keys_nr; i++) {
+ if (AirPDcapValidateKey(keys+i)==TRUE) {
+ if (keys[i].KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a WPA-PWD key", AIRPDCAP_DEBUG_LEVEL_4);
+ AirPDcapRsnaPwd2Psk(keys[i].KeyData.Wpa.UserPwd.Passphrase, keys[i].KeyData.Wpa.UserPwd.Ssid, keys[i].KeyData.Wpa.UserPwd.SsidLen, keys[i].KeyData.Wpa.Psk);
+ }
+#ifdef _DEBUG
+ else if (keys[i].KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a WPA-PMK key", AIRPDCAP_DEBUG_LEVEL_4);
+ } else if (keys[i].KeyType==AIRPDCAP_KEY_TYPE_WEP) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a WEP key", AIRPDCAP_DEBUG_LEVEL_4);
+ } else {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a key", AIRPDCAP_DEBUG_LEVEL_4);
+ }
+#endif
+
+ ctx->keys[success].KeyType=keys[i].KeyType;
+ memcpy(&ctx->keys[success].KeyData, &keys[i].KeyData, sizeof(keys[i].KeyData));
+
+ success++;
+ }
+ }
+
+ ctx->keys_nr=success;
+
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapSetKeys");
+ return success;
+}
+
+INT AirPDcapCleanKeys(
+ PAIRPDCAP_CONTEXT ctx)
+{
+ INT i;
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapCleanKeys");
+
+ if (ctx==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapCleanKeys", "NULL context", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapCleanKeys");
+ return 0;
+ }
+
+ for (i=0; i<AIRPDCAP_MAX_KEYS_NR; i++) {
+ memset(&ctx->keys[i], 0, sizeof(AIRPDCAP_KEY_ITEM));
+ }
+
+ ctx->keys_nr=0;
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapCleanKeys", "Keys collection cleaned!", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapCleanKeys");
+
+ return i;
+}
+
+INT AirPDcapGetKeys(
+ const PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_KEY_ITEM keys[],
+ const size_t keys_nr)
+{
+ UINT i;
+ UINT j;
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapGetKeys");
+
+ if (ctx==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapGetKeys", "NULL context", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapGetKeys");
+ return 0;
+ } else if (keys==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapGetKeys", "NULL keys array", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapGetKeys");
+ return (INT)ctx->keys_nr;
+ } else {
+ for (i=0, j=0; i<ctx->keys_nr && i<keys_nr && i<AIRPDCAP_MAX_KEYS_NR; i++) {
+ keys[j].KeyType=ctx->keys[i].KeyType;
+ memcpy(&keys[j].KeyData, &ctx->keys[i].KeyData, sizeof(keys[j].KeyData));
+ j++;
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapGetKeys", "Got a key", AIRPDCAP_DEBUG_LEVEL_5);
+ }
+
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapGetKeys");
+ return j;
+ }
+}
+
+INT AirPDcapInitContext(
+ PAIRPDCAP_CONTEXT ctx)
+{
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapInitContext");
+
+ if (ctx==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapInitContext", "NULL context", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapInitContext");
+ return AIRPDCAP_RET_UNSUCCESS;
+ }
+
+ AirPDcapCleanKeys(ctx);
+
+ ctx->first_free_index=0;
+ ctx->index=-1;
+ ctx->last_stored_index=-1;
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapInitContext", "Context initialized!", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapInitContext");
+ return AIRPDCAP_RET_SUCCESS;
+}
+
+INT AirPDcapDestroyContext(
+ PAIRPDCAP_CONTEXT ctx)
+{
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapDestroyContext");
+
+ if (ctx==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapDestroyContext", "NULL context", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapDestroyContext");
+ return AIRPDCAP_RET_UNSUCCESS;
+ }
+
+ AirPDcapCleanKeys(ctx);
+
+ ctx->first_free_index=0;
+ ctx->index=-1;
+ ctx->last_stored_index=-1;
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapDestroyContext", "Context destroyed!", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapDestroyContext");
+ return AIRPDCAP_RET_SUCCESS;
+}
+
+#ifdef __cplusplus
+}
+#endif
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal function definitions */
+/* */
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+INT AirPDcapRsnaMng(
+ UCHAR *decrypt_data,
+ size_t *decrypt_len,
+ PAIRPDCAP_KEY_ITEM key,
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ INT offset,
+ UINT8 fcsPresent)
+{
+ INT ret_value;
+ ULONG crc;
+
+ if (sa->key==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "No key associated", AIRPDCAP_DEBUG_LEVEL_3);
+ return AIRPDCAP_RET_REQ_DATA;
+ }
+ if (sa->validKey==FALSE) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "Key not yet valid", AIRPDCAP_DEBUG_LEVEL_3);
+ return AIRPDCAP_RET_UNSUCCESS;
+ }
+ if (sa->wpa.key_ver==1) {
+ /* CCMP -> HMAC-MD5 is the EAPOL-Key MIC, RC4 is the EAPOL-Key encryption algorithm */
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "TKIP", AIRPDCAP_DEBUG_LEVEL_3);
+
+ ret_value=AirPDcapTkipDecrypt(decrypt_data+offset, *decrypt_len-offset, decrypt_data+AIRPDCAP_TA_OFFSET, AIRPDCAP_GET_TK(sa->wpa.ptk));
+ if (ret_value)
+ return ret_value;
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "TKIP DECRYPTED!!!", AIRPDCAP_DEBUG_LEVEL_3);
+ /* remove MIC (8bytes) and ICV (4bytes) from the end of packet */
+ *decrypt_len-=12;
+ } else {
+ /* AES-CCMP -> HMAC-SHA1-128 is the EAPOL-Key MIC, AES wep_key wrap is the EAPOL-Key encryption algorithm */
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "CCMP", AIRPDCAP_DEBUG_LEVEL_3);
+
+ ret_value=AirPDcapCcmpDecrypt(decrypt_data, (INT)*decrypt_len, AIRPDCAP_GET_TK(sa->wpa.ptk));
+ if (ret_value)
+ return ret_value;
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "CCMP DECRYPTED!!!", AIRPDCAP_DEBUG_LEVEL_3);
+ /* remove MIC (8bytes) from the end of packet */
+ *decrypt_len-=8;
+ }
+
+ /* remove protection bit */
+ decrypt_data[1]&=0xBF;
+
+ /* remove TKIP/CCMP header */
+ offset=AIRPDCAP_HEADER_LEN(decrypt_data[1]);
+ *decrypt_len-=8;
+ memcpy(decrypt_data+offset, decrypt_data+offset+8, *decrypt_len-offset);
+
+ if (fcsPresent) {
+ /* calculate FCS */
+ AirPDcapAlgCrc32(decrypt_data, *decrypt_len, &crc);
+ *(unsigned long*)(decrypt_data+*decrypt_len)=crc;
+
+ /* add FCS in packet */
+ *decrypt_len+=4;
+ }
+
+ if (key!=NULL) {
+ memcpy(key, sa->key, sizeof(AIRPDCAP_KEY_ITEM));
+
+ if (sa->wpa.key_ver==AIRPDCAP_WPA_KEY_VER_CCMP)
+ key->KeyType=AIRPDCAP_KEY_TYPE_TKIP;
+ else if (sa->wpa.key_ver==AIRPDCAP_WPA_KEY_VER_AES_CCMP)
+ key->KeyType=AIRPDCAP_KEY_TYPE_CCMP;
+ }
+
+ return AIRPDCAP_RET_SUCCESS;
+}
+
+INT AirPDcapWepMng(
+ PAIRPDCAP_CONTEXT ctx,
+ UCHAR *decrypt_data,
+ size_t *decrypt_len,
+ PAIRPDCAP_KEY_ITEM key,
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ INT offset,
+ UINT8 fcsPresent)
+{
+ UCHAR wep_key[AIRPDCAP_WEP_KEY_MAXLEN+AIRPDCAP_WEP_IVLEN];
+ size_t keylen;
+ INT ret_value=1;
+ ULONG crc;
+ INT key_index;
+ AIRPDCAP_KEY_ITEM *tmp_key;
+ UINT8 useCache=FALSE;
+
+ if (sa->key!=NULL)
+ useCache=TRUE;
+
+ for (key_index=0; key_index<(INT)ctx->keys_nr; key_index++) {
+ /* use the cached one, or try all keys */
+ if (!useCache) {
+ tmp_key=&ctx->keys[key_index];
+ } else {
+ if (sa->key!=NULL && sa->key->KeyType==AIRPDCAP_KEY_TYPE_WEP) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "Try cached WEP key...", AIRPDCAP_DEBUG_LEVEL_3);
+ tmp_key=sa->key;
+ } else {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "Cached key is not valid, try another WEP key...", AIRPDCAP_DEBUG_LEVEL_3);
+ tmp_key=&ctx->keys[key_index];
+ }
+ }
+
+ /* obviously, try only WEP keys... */
+ if (tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WEP)
+ {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "Try WEP key...", AIRPDCAP_DEBUG_LEVEL_3);
+
+ memset(wep_key, 0, sizeof(wep_key));
+
+ /* Costruct the WEP seed: copy the IV in first 3 bytes and then the WEP key (refer to 802-11i-2004, 8.2.1.4.3, pag. 36) */
+ memcpy(wep_key, decrypt_data+AIRPDCAP_HEADER_LEN(decrypt_data[1]), AIRPDCAP_WEP_IVLEN);
+ keylen=tmp_key->KeyData.Wep.WepKeyLen;
+ memcpy(wep_key+AIRPDCAP_WEP_IVLEN, tmp_key->KeyData.Wep.WepKey, keylen);
+
+ ret_value=AirPDcapWepDecrypt(wep_key,
+ keylen+AIRPDCAP_WEP_IVLEN,
+ decrypt_data + (AIRPDCAP_HEADER_LEN(decrypt_data[1])+AIRPDCAP_WEP_IVLEN+AIRPDCAP_WEP_KIDLEN),
+ *decrypt_len-(AIRPDCAP_HEADER_LEN(decrypt_data[1])+AIRPDCAP_WEP_IVLEN+AIRPDCAP_WEP_KIDLEN+AIRPDCAP_CRC_LEN));
+
+ }
+
+ if (!ret_value && tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WEP) {
+ /* the tried key is the correct one, cached in the Security Association */
+
+ sa->key=tmp_key;
+
+ if (key!=NULL) {
+ memcpy(key, &sa->key, sizeof(AIRPDCAP_KEY_ITEM));
+ key->KeyType=AIRPDCAP_KEY_TYPE_WEP;
+ }
+
+ break;
+ } else {
+ /* the cached key was not valid, try other keys */
+
+ if (useCache==TRUE) {
+ useCache=FALSE;
+ key_index--;
+ }
+ }
+ }
+
+ if (ret_value)
+ return ret_value;
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "WEP DECRYPTED!!!", AIRPDCAP_DEBUG_LEVEL_3);
+
+ /* remove ICV (4bytes) from the end of packet */
+ *decrypt_len-=4;
+
+ /* remove protection bit */
+ decrypt_data[1]&=0xBF;
+
+ /* remove IC header */
+ offset=AIRPDCAP_HEADER_LEN(decrypt_data[1]);
+ *decrypt_len-=4;
+ memcpy(decrypt_data+offset, decrypt_data+offset+AIRPDCAP_WEP_IVLEN+AIRPDCAP_WEP_KIDLEN, *decrypt_len-offset);
+
+ if (fcsPresent) {
+ /* calculate FCS and append it at the end of the decrypted packet */
+ AirPDcapAlgCrc32(decrypt_data, *decrypt_len, &crc);
+ *(unsigned long*)(decrypt_data+*decrypt_len)=crc;
+
+ /* add FCS in packet */
+ *decrypt_len += 4;
+ }
+
+ return AIRPDCAP_RET_SUCCESS;
+}
+
+/* Refer to IEEE 802.11i-2004, 8.5.3, pag. 85 */
+INT AirPDcapRsna4WHandshake(
+ PAIRPDCAP_CONTEXT ctx,
+ const UCHAR *data,
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ PAIRPDCAP_KEY_ITEM key,
+ INT offset)
+{
+ AIRPDCAP_KEY_ITEM *tmp_key;
+ INT key_index;
+ INT ret_value=1;
+ UCHAR useCache=FALSE;
+ UCHAR eapol[AIRPDCAP_EAPOL_MAX_LEN];
+ USHORT eapol_len;
+
+ if (sa->key!=NULL)
+ useCache=TRUE;
+
+ /* a 4-way handshake packet use a Pairwise key type (IEEE 802.11i-2004, pg. 79) */
+ if (AIRPDCAP_EAP_KEY(data[offset+1])!=1) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Group/STAKey message (not used)", AIRPDCAP_DEBUG_LEVEL_5);
+ return AIRPDCAP_RET_NO_VALID_HANDSHAKE;
+ }
+
+ /* TODO timeouts? reauthentication? */
+
+ /* TODO consider key-index */
+
+ /* TODO considera Deauthentications */
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake...", AIRPDCAP_DEBUG_LEVEL_5);
+
+ /* manage 4-way handshake packets; this step completes the 802.1X authentication process (IEEE 802.11i-2004, pag. 85) */
+
+ /* message 1: Authenticator->Supplicant (Sec=0, Mic=0, Ack=1, Inst=0, Key=1(pairwise), KeyRSC=0, Nonce=ANonce, MIC=0) */
+ if (AIRPDCAP_EAP_INST(data[offset+1])==0 &&
+ AIRPDCAP_EAP_ACK(data[offset+1])==1 &&
+ AIRPDCAP_EAP_MIC(data[offset])==0)
+ {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 1", AIRPDCAP_DEBUG_LEVEL_3);
+
+ /* On reception of Message 1, the Supplicant determines whether the Key Replay Counter field value has been */
+ /* used before with the current PMKSA. If the Key Replay Counter field value is less than or equal to the current */
+ /* local value, the Supplicant discards the message. */
+ /* -> not checked, the Authenticator will be send another Message 1 (hopefully!) */
+
+ /* save ANonce (from authenticator) to derive the PTK with the SNonce (from the 2 message) */
+ memcpy(sa->wpa.nonce, data+offset+12, 32);
+
+ /* get the Key Descriptor Version (to select algorithm used in decryption -CCMP or TKIP-) */
+ sa->wpa.key_ver=AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1]);
+
+ sa->handshake=1;
+
+ return AIRPDCAP_RET_SUCCESS_HANDSHAKE;
+ }
+
+ /* message 2|4: Supplicant->Authenticator (Sec=0|1, Mic=1, Ack=0, Inst=0, Key=1(pairwise), KeyRSC=0, Nonce=SNonce|0, MIC=MIC(KCK,EAPOL)) */
+ if (AIRPDCAP_EAP_INST(data[offset+1])==0 &&
+ AIRPDCAP_EAP_ACK(data[offset+1])==0 &&
+ AIRPDCAP_EAP_MIC(data[offset])==1)
+ {
+ if (AIRPDCAP_EAP_SEC(data[offset])==0) {
+
+ /* PATCH: some implementations set secure bit to 0 also in the 4th message */
+ /* to recognize which message is this check if wep_key data lenght is 0 */
+ /* in the 4th message */
+ if (*(UINT16 *)(data+offset+92)!=0) {
+ /* message 2 */
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 2", AIRPDCAP_DEBUG_LEVEL_3);
+
+ /* On reception of Message 2, the Authenticator checks that the key replay counter corresponds to the */
+ /* outstanding Message 1. If not, it silently discards the message. */
+ /* If the calculated MIC does not match the MIC that the Supplicant included in the EAPOL-Key frame, */
+ /* the Authenticator silently discards Message 2. */
+ /* -> not checked; the Supplicant will send another message 2 (hopefully!) */
+
+ /* now you can derive the PTK */
+ for (key_index=0; key_index<(INT)ctx->keys_nr || sa->key!=NULL; key_index++) {
+ /* use the cached one, or try all keys */
+ if (!useCache) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Try WPA key...", AIRPDCAP_DEBUG_LEVEL_3);
+ tmp_key=&ctx->keys[key_index];
+ } else {
+ /* there is a cached key in the security association, if it's a WPA key try it... */
+ if (sa->key!=NULL &&
+ sa->key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD ||
+ sa->key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PSK ||
+ sa->key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Try cached WPA key...", AIRPDCAP_DEBUG_LEVEL_3);
+ tmp_key=sa->key;
+ } else {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Cached key is of a wrong type, try WPA key...", AIRPDCAP_DEBUG_LEVEL_3);
+ tmp_key=&ctx->keys[key_index];
+ }
+ }
+
+ /* obviously, try only WPA keys... */
+ if (tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD ||
+ tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PSK ||
+ tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK)
+ {
+ /* derive the PTK from the BSSID, STA MAC, PMK, SNonce, ANonce */
+ AirPDcapRsnaPrfX(sa, /* authenticator nonce, bssid, station mac */
+ tmp_key->KeyData.Wpa.Pmk, /* PMK */
+ data+offset+12, /* supplicant nonce */
+ 512,
+ sa->wpa.ptk);
+
+ /* verify the MIC (compare the MIC in the packet included in this message with a MIC calculated with the PTK) */
+ eapol_len=(USHORT)(ntohs(*(UINT16 *)(data+offset-3))+4);
+ memcpy(eapol, &data[offset-5], (eapol_len<AIRPDCAP_EAPOL_MAX_LEN?eapol_len:AIRPDCAP_EAPOL_MAX_LEN));
+ ret_value=AirPDcapRsnaMicCheck(eapol, /* eapol frame (header also) */
+ eapol_len, /* eapol frame length */
+ sa->wpa.ptk, /* Key Confirmation Key */
+ AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])); /* EAPOL-Key description version */
+
+ /* If the MIC is valid, the Authenticator checks that the RSN information element bit-wise matches */
+ /* that from the (Re)Association Request message. */
+ /* i) TODO If these are not exactly the same, the Authenticator uses MLME-DEAUTHENTICATE.request */
+ /* primitive to terminate the association. */
+ /* ii) If they do match bit-wise, the Authenticator constructs Message 3. */
+ }
+
+ if (!ret_value &&
+ (tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD ||
+ tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PSK ||
+ tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK))
+ {
+ /* the temporary key is the correct one, cached in the Security Association */
+
+ sa->key=tmp_key;
+
+ if (key!=NULL) {
+ memcpy(key, &tmp_key, sizeof(AIRPDCAP_KEY_ITEM));
+ if (AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])==AIRPDCAP_WPA_KEY_VER_CCMP)
+ key->KeyType=AIRPDCAP_KEY_TYPE_TKIP;
+ else if (AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])==AIRPDCAP_WPA_KEY_VER_AES_CCMP)
+ key->KeyType=AIRPDCAP_KEY_TYPE_CCMP;
+ }
+
+ break;
+ } else {
+ /* the cached key was not valid, try other keys */
+
+ if (useCache==TRUE) {
+ useCache=FALSE;
+ key_index--;
+ }
+ }
+ }
+
+ if (ret_value) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "handshake step failed", AIRPDCAP_DEBUG_LEVEL_3);
+ return ret_value;
+ }
+
+ sa->handshake=2;
+
+ return AIRPDCAP_RET_SUCCESS_HANDSHAKE;
+ } else {
+ /* message 4 */
+
+ /* TODO "Note that when the 4-Way Handshake is first used Message 4 is sent in the clear." */
+
+ /* TODO check MIC and Replay Counter */
+ /* On reception of Message 4, the Authenticator verifies that the Key Replay Counter field value is one */
+ /* that it used on this 4-Way Handshake; if it is not, it silently discards the message. */
+ /* If the calculated MIC does not match the MIC that the Supplicant included in the EAPOL-Key frame, the */
+ /* Authenticator silently discards Message 4. */
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 4 (patched)", AIRPDCAP_DEBUG_LEVEL_3);
+
+ sa->handshake=4;
+
+ sa->validKey=TRUE;
+
+ return AIRPDCAP_RET_SUCCESS_HANDSHAKE;
+ }
+ /* END OF PATCH */
+ /* */
+ } else {
+ /* message 4 */
+
+ /* TODO "Note that when the 4-Way Handshake is first used Message 4 is sent in the clear." */
+
+ /* TODO check MIC and Replay Counter */
+ /* On reception of Message 4, the Authenticator verifies that the Key Replay Counter field value is one */
+ /* that it used on this 4-Way Handshake; if it is not, it silently discards the message. */
+ /* If the calculated MIC does not match the MIC that the Supplicant included in the EAPOL-Key frame, the */
+ /* Authenticator silently discards Message 4. */
+
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 4", AIRPDCAP_DEBUG_LEVEL_3);
+
+ sa->handshake=4;
+
+ sa->validKey=TRUE;
+
+ return AIRPDCAP_RET_SUCCESS_HANDSHAKE;
+ }
+ }
+
+ /* message 3: Authenticator->Supplicant (Sec=1, Mic=1, Ack=1, Inst=0/1, Key=1(pairwise), KeyRSC=???, Nonce=ANonce, MIC=1) */
+ if (AIRPDCAP_EAP_ACK(data[offset+1])==1 &&
+ AIRPDCAP_EAP_MIC(data[offset])==1)
+ {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 3", AIRPDCAP_DEBUG_LEVEL_3);
+
+ /* On reception of Message 3, the Supplicant silently discards the message if the Key Replay Counter field */
+ /* value has already been used or if the ANonce value in Message 3 differs from the ANonce value in Message 1. */
+ /* -> not checked, the Authenticator will send another message 3 (hopefully!) */
+
+ /* TODO check page 88 (RNS) */
+
+ return AIRPDCAP_RET_SUCCESS_HANDSHAKE;
+ }
+
+ return AIRPDCAP_RET_UNSUCCESS;
+}
+
+INT AirPDcapRsnaMicCheck(
+ UCHAR *eapol,
+ const USHORT eapol_len,
+ const UCHAR KCK[AIRPDCAP_WPA_KCK_LEN],
+ const USHORT key_ver)
+{
+ UCHAR mic[AIRPDCAP_WPA_MICKEY_LEN];
+ UCHAR c_mic[20]; /* MIC 16 byte, the HMAC-SHA1 use a buffer of 20 bytes */
+
+ /* copy the MIC from the EAPOL packet */
+ memcpy(mic, eapol+AIRPDCAP_WPA_MICKEY_OFFSET+4, AIRPDCAP_WPA_MICKEY_LEN);
+
+ /* set to 0 the MIC in the EAPOL packet (to calculate the MIC) */
+ memset(eapol+AIRPDCAP_WPA_MICKEY_OFFSET+4, 0, AIRPDCAP_WPA_MICKEY_LEN);
+
+ if (key_ver==AIRPDCAP_WPA_KEY_VER_CCMP) {
+ /* use HMAC-MD5 for the EAPOL-Key MIC */
+ AirPDcapAlgHmacMd5((UCHAR *)KCK, AIRPDCAP_WPA_KCK_LEN, eapol, eapol_len, c_mic);
+ } else if (key_ver==AIRPDCAP_WPA_KEY_VER_AES_CCMP) {
+ /* use HMAC-SHA1-128 for the EAPOL-Key MIC */
+ AirPDcapAlgHmacSha1(KCK, AIRPDCAP_WPA_KCK_LEN, eapol, eapol_len, c_mic);
+ } else
+ /* key descriptor version not recognized */
+ return AIRPDCAP_RET_UNSUCCESS;
+
+ /* compare calculated MIC with the Key MIC and return result (0 means success) */
+ return memcmp(mic, c_mic, AIRPDCAP_WPA_MICKEY_LEN);
+}
+
+INT AirPDcapValidateKey(
+ PAIRPDCAP_KEY_ITEM key)
+{
+ size_t len;
+ UCHAR ret=TRUE;
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapValidateKey");
+
+ if (key==NULL) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "NULL key", AIRPDCAP_DEBUG_LEVEL_5);
+ AIRPDCAP_DEBUG_TRACE_START("AirPDcapValidateKey");
+ return FALSE;
+ }
+
+ switch (key->KeyType) {
+case AIRPDCAP_KEY_TYPE_WEP:
+ /* check key size limits */
+ len=key->KeyData.Wep.WepKeyLen;
+ if (len<AIRPDCAP_WEP_KEY_MINLEN || len>AIRPDCAP_WEP_KEY_MAXLEN) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "WEP key: key length not accepted", AIRPDCAP_DEBUG_LEVEL_5);
+ ret=FALSE;
+ }
+ break;
+
+case AIRPDCAP_KEY_TYPE_WEP_40:
+ /* set the standard length and use a generic WEP key type */
+ key->KeyData.Wep.WepKeyLen=AIRPDCAP_WEP_40_KEY_LEN;
+ key->KeyType=AIRPDCAP_KEY_TYPE_WEP;
+ break;
+
+case AIRPDCAP_KEY_TYPE_WEP_104:
+ /* set the standard length and use a generic WEP key type */
+ key->KeyData.Wep.WepKeyLen=AIRPDCAP_WEP_104_KEY_LEN;
+ key->KeyType=AIRPDCAP_KEY_TYPE_WEP;
+ break;
+
+case AIRPDCAP_KEY_TYPE_WPA_PWD:
+ /* check passphrase and SSID size limits */
+ len=strlen(key->KeyData.Wpa.UserPwd.Passphrase);
+ if (len<AIRPDCAP_WPA_PASSPHRASE_MIN_LEN || len>AIRPDCAP_WPA_PASSPHRASE_MAX_LEN) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "WPA-PWD key: passphrase length not accepted", AIRPDCAP_DEBUG_LEVEL_5);
+ ret=FALSE;
+ }
+
+ len=key->KeyData.Wpa.UserPwd.SsidLen;
+ if (len<AIRPDCAP_WPA_SSID_MIN_LEN || len>AIRPDCAP_WPA_SSID_MAX_LEN) {
+ AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "WPA-PWD key: ssid length not accepted", AIRPDCAP_DEBUG_LEVEL_5);
+ ret=FALSE;
+ }
+
+ break;
+
+case AIRPDCAP_KEY_TYPE_WPA_PSK:
+ break;
+
+case AIRPDCAP_KEY_TYPE_WPA_PMK:
+ break;
+
+default:
+ ret=FALSE;
+ }
+
+ AIRPDCAP_DEBUG_TRACE_END("AirPDcapValidateKey");
+ return ret;
+}
+
+INT AirPDcapGetSa(
+ PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_SEC_ASSOCIATION_ID *id)
+{
+ INT index;
+
+ if (ctx->last_stored_index!=-1) {
+ /* at least one association was stored */
+ /* search for the association from last_stored_index to 0 (most recent added) */
+ for (index=ctx->last_stored_index; index>=0; index--) {
+ if (ctx->sa[index].used) {
+ if (memcmp(id, &(ctx->sa[index].saId), sizeof(AIRPDCAP_SEC_ASSOCIATION_ID))==0) {
+ ctx->index=index;
+ return index;
+ }
+ }
+ }
+ }
+
+ return -1;
+}
+
+INT AirPDcapFreeSa(
+ PAIRPDCAP_CONTEXT ctx,
+ INT index) /* index of the structure to free */
+{
+ /* set the structure as free (the reset will be done in AIRPDCAP_store_sta_info) */
+ ctx->sa[index].used=0;
+
+ /* set the first_free_index to avoid free blocks in the middle */
+ if (index<ctx->first_free_index)
+ ctx->first_free_index=index;
+
+ /* decrement the last_stored_index if this was the last stored block */
+ if (index==ctx->last_stored_index)
+ ctx->last_stored_index--;
+
+ /* if the list is empty, set the index */
+ if (ctx->last_stored_index==-1)
+ ctx->index=-1;
+
+ return ctx->index;
+}
+
+INT AirPDcapStoreSa(
+ PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_SEC_ASSOCIATION_ID *id)
+{
+ INT last_free;
+
+ if (ctx->sa[ctx->first_free_index].used) {
+ /* last addition was in the middle of the array (and the first_free_index was just incremented by 1) */
+ /* search for a free space from the first_free_index to AIRPDCAP_STA_INFOS_NR (to avoid free blocks in */
+ /* the middle) */
+ for (last_free=ctx->first_free_index; last_free<AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR; last_free++)
+ if (!ctx->sa[last_free].used)
+ break;
+
+ if (last_free>=AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR) {
+ /* there is no empty space available. FAILURE */
+ return -1;
+ }
+
+ /* store first free space index */
+ ctx->first_free_index=last_free;
+ }
+
+ /* use this info */
+ ctx->index=ctx->first_free_index;
+
+ /* reset the info structure */
+ memset(ctx->sa+ctx->index, 0, sizeof(AIRPDCAP_SEC_ASSOCIATION));
+
+ ctx->sa[ctx->index].used=1;
+
+ /* set the info structure */
+ memcpy(&(ctx->sa[ctx->index].saId), id, sizeof(AIRPDCAP_SEC_ASSOCIATION_ID));
+
+ /* increment by 1 the first_free_index (heuristic) */
+ ctx->first_free_index++;
+
+ /* set the last_stored_index if the added index is greater the the last_stored_index */
+ if (ctx->index > ctx->last_stored_index)
+ ctx->last_stored_index=ctx->index;
+
+ return ctx->index;
+}
+
+UCHAR * AirPDcapGetStaAddress(
+ PAIRPDCAP_MAC_FRAME frame)
+{
+ if (AIRPDCAP_TO_DS(frame->fc[1])==0) {
+ if (AIRPDCAP_FROM_DS(frame->fc[1])==0)
+ return NULL;
+ else
+ return frame->addr1;
+ } else {
+ if (AIRPDCAP_FROM_DS(frame->fc[1])==0)
+ return frame->addr2;
+ else
+ return NULL;
+ }
+}
+
+UCHAR * AirPDcapGetBssidAddress(
+ PAIRPDCAP_MAC_FRAME frame)
+{
+ if (AIRPDCAP_TO_DS(frame->fc[1])==0) {
+ if (AIRPDCAP_FROM_DS(frame->fc[1])==0)
+ return frame->addr3;
+ else
+ return frame->addr2;
+ } else {
+ if (AIRPDCAP_FROM_DS(frame->fc[1])==0)
+ return frame->addr1;
+ else
+ return NULL;
+ }
+}
+
+/* Function used to derive the PTK. Refer to IEEE 802.11I-2004, pag. 74 */
+void AirPDcapRsnaPrfX(
+ AIRPDCAP_SEC_ASSOCIATION *sa,
+ const UCHAR pmk[32],
+ const UCHAR snonce[32],
+ const INT x, /* for TKIP 512, for CCMP 384 */
+ UCHAR *ptk)
+{
+ UINT8 i;
+ UCHAR R[100];
+ INT offset=sizeof("Pairwise key expansion");
+
+ memset(R, 0, 100);
+
+ memcpy(R, "Pairwise key expansion", offset);
+
+ /* Min(AA, SPA) || Max(AA, SPA) */
+ if (memcmp(sa->saId.sta, sa->saId.bssid, AIRPDCAP_MAC_LEN) < 0)
+ {
+ memcpy(R + offset, sa->saId.sta, AIRPDCAP_MAC_LEN);
+ memcpy(R + offset+AIRPDCAP_MAC_LEN, sa->saId.bssid, AIRPDCAP_MAC_LEN);
+ }
+ else
+ {
+ memcpy(R + offset, sa->saId.bssid, AIRPDCAP_MAC_LEN);
+ memcpy(R + offset+AIRPDCAP_MAC_LEN, sa->saId.sta, AIRPDCAP_MAC_LEN);
+ }
+
+ offset+=AIRPDCAP_MAC_LEN*2;
+
+ /* Min(ANonce,SNonce) || Max(ANonce,SNonce) */
+ if( memcmp(snonce, sa->wpa.nonce, 32) < 0 )
+ {
+ memcpy(R + offset, snonce, 32);
+ memcpy(R + offset + 32, sa->wpa.nonce, 32);
+ }
+ else
+ {
+ memcpy(R + offset, sa->wpa.nonce, 32);
+ memcpy(R + offset + 32, snonce, 32);
+ }
+
+ offset+=32*2;
+
+ for(i = 0; i < (x+159)/160; i++)
+ {
+ R[offset] = i;
+ AirPDcapAlgHmacSha1(pmk, 32, R, 100, ptk + i * 20);
+ }
+}
+
+INT AirPDcapRsnaPwd2PskStep(
+ const CHAR *password,
+ const CHAR *ssid,
+ const size_t ssidLength,
+ const INT iterations,
+ const INT count,
+ UCHAR *output)
+{
+ UCHAR digest[36], digest1[AIRPDCAP_SHA_DIGEST_LEN];
+ INT i, j;
+
+ /* U1 = PRF(P, S || INT(i)) */
+ memcpy(digest, ssid, ssidLength);
+ digest[ssidLength] = (UCHAR)((count>>24) & 0xff);
+ digest[ssidLength+1] = (UCHAR)((count>>16) & 0xff);
+ digest[ssidLength+2] = (UCHAR)((count>>8) & 0xff);
+ digest[ssidLength+3] = (UCHAR)(count & 0xff);
+ AirPDcapAlgHmacSha1((UCHAR *)password, strlen(password), digest, ssidLength+4, digest1);
+
+ /* output = U1 */
+ memcpy(output, digest1, AIRPDCAP_SHA_DIGEST_LEN);
+ for (i = 1; i < iterations; i++) {
+ /* Un = PRF(P, Un-1) */
+ AirPDcapAlgHmacSha1((UCHAR *)password, strlen(password), digest1, AIRPDCAP_SHA_DIGEST_LEN, digest);
+
+ memcpy(digest1, digest, AIRPDCAP_SHA_DIGEST_LEN);
+ /* output = output xor Un */
+ for (j = 0; j < AIRPDCAP_SHA_DIGEST_LEN; j++) {
+ output[j] ^= digest[j];
+ }
+ }
+
+ return AIRPDCAP_RET_SUCCESS;
+}
+
+INT AirPDcapRsnaPwd2Psk(
+ const CHAR *password,
+ const CHAR *ssid,
+ const size_t ssidLength,
+ UCHAR *output)
+{
+ UCHAR m_output[AIRPDCAP_WPA_PSK_LEN];
+
+ memset(m_output, 0, AIRPDCAP_WPA_PSK_LEN);
+
+ memset(m_output, 0, 40);
+
+ AirPDcapRsnaPwd2PskStep(password, ssid, ssidLength, 4096, 1, m_output);
+ AirPDcapRsnaPwd2PskStep(password, ssid, ssidLength, 4096, 2, &m_output[AIRPDCAP_SHA_DIGEST_LEN]);
+
+ memcpy(output, m_output, AIRPDCAP_WPA_PSK_LEN);
+
+ return 0;
+}
+
+/***************************************************************************/
+/* The following code come from freeBSD and implements the AUTODIN II */
+/* polynomial used by 802.11. */
+/* It can be used to calculate multicast address hash indices. */
+/* It assumes that the low order bits will be transmitted first, */
+/* and consequently the low byte should be sent first when */
+/* the crc computation is finished. The crc should be complemented */
+/* before transmission. */
+/* The variable corresponding to the macro argument "crc" should */
+/* be an unsigned long and should be preset to all ones for Ethernet */
+/* use. An error-free packet will leave 0xDEBB20E3 in the crc. */
+/***************************************************************************/
+INT AirPDcapAlgCrc32(
+ UCHAR *buf,
+ size_t nr,
+ ULONG *cval)
+{
+ ULONG crc32_total = 0 ;
+ ULONG crc = ~(ULONG)0;
+ UCHAR *p ;
+ size_t len;
+
+ len = 0 ;
+ crc32_total = ~crc32_total ;
+
+ for(len += nr, p = buf; nr--; ++p)
+ {
+ CRC(crc, *p) ;
+ CRC(crc32_total, *p) ;
+ }
+
+ *cval = ~crc ;
+ crc32_total = ~crc32_total ;
+
+ return 0;
+}
+
+#ifdef __cplusplus
+}
+#endif
+/* */
+/******************************************************************************/
diff --git a/epan/crypt/airpdcap_ccmp.c b/epan/crypt/airpdcap_ccmp.c
new file mode 100644
index 0000000000..5dfa85a8f6
--- /dev/null
+++ b/epan/crypt/airpdcap_ccmp.c
@@ -0,0 +1,245 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_system.h"
+#include "airpdcap_int.h"
+
+#include "airpdcap_rijndael.h"
+
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+/* Note: this code were copied from FreeBSD source code, RELENG 6, */
+/* sys/net80211/ieee80211_crypto_ccmp.c */
+
+/******************************************************************************/
+/* Internal definitions */
+/* */
+#define AES_BLOCK_LEN 16
+
+/* Note: copied from net80211/ieee80211.h */
+#define AIRPDCAP_FC1_DIR_MASK 0x03
+#define AIRPDCAP_FC1_DIR_DSTODS 0x03 /* AP ->AP */
+#define AIRPDCAP_FC0_SUBTYPE_QOS 0x80
+#define AIRPDCAP_FC0_TYPE_DATA 0x08
+#define AIRPDCAP_FC0_TYPE_MASK 0x0c
+#define AIRPDCAP_SEQ_FRAG_MASK 0x000f
+#define AIRPDCAP_QOS_HAS_SEQ(wh) \
+ (((wh)->fc[0] & \
+ (AIRPDCAP_FC0_TYPE_MASK | AIRPDCAP_FC0_SUBTYPE_QOS)) == \
+ (AIRPDCAP_FC0_TYPE_DATA | AIRPDCAP_FC0_SUBTYPE_QOS))
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal macros */
+/* */
+#define CCMP_DECRYPT(_i, _b, _b0, _pos, _a, _len) { \
+ /* Decrypt, with counter */ \
+ _b0[14] = (UINT8)((_i >> 8) & 0xff); \
+ _b0[15] = (UINT8)(_i & 0xff); \
+ rijndael_encrypt(&key, _b0, _b); \
+ xor_block(_pos, _b, _len); \
+ /* Authentication */ \
+ xor_block(_a, _pos, _len); \
+ rijndael_encrypt(&key, _a, _a); \
+}
+
+#define AIRPDCAP_ADDR_COPY(dst,src) memcpy(dst,src,AIRPDCAP_MAC_LEN)
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal function prototypes declarations */
+/* */
+static void ccmp_init_blocks(
+ rijndael_ctx *ctx,
+ PAIRPDCAP_MAC_FRAME wh,
+ UINT64 pn,
+ size_t dlen,
+ UINT8 b0[AES_BLOCK_LEN],
+ UINT8 aad[2 * AES_BLOCK_LEN],
+ UINT8 a[AES_BLOCK_LEN],
+ UINT8 b[AES_BLOCK_LEN])
+ ;
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Function definitions */
+/* */
+static __inline UINT64 READ_6(
+ UINT8 b0,
+ UINT8 b1,
+ UINT8 b2,
+ UINT8 b3,
+ UINT8 b4,
+ UINT8 b5)
+{
+ UINT32 iv32 = (b0 << 0) | (b1 << 8) | (b2 << 16) | (b3 << 24);
+ UINT16 iv16 = (UINT16)((b4 << 0) | (b5 << 8));
+ return (((UINT64)iv16) << 32) | iv32;
+}
+
+static void ccmp_init_blocks(
+ rijndael_ctx *ctx,
+ PAIRPDCAP_MAC_FRAME wh,
+ UINT64 pn,
+ size_t dlen,
+ UINT8 b0[AES_BLOCK_LEN],
+ UINT8 aad[2 * AES_BLOCK_LEN],
+ UINT8 a[AES_BLOCK_LEN],
+ UINT8 b[AES_BLOCK_LEN])
+{
+#define IS_4ADDRESS(wh) \
+ ((wh->fc[1] & AIRPDCAP_FC1_DIR_MASK) == AIRPDCAP_FC1_DIR_DSTODS)
+#define IS_QOS_DATA(wh) AIRPDCAP_QOS_HAS_SEQ(wh)
+
+ memset(aad, 0, 2*AES_BLOCK_LEN);
+
+ /* CCM Initial Block:
+ * Flag (Include authentication header, M=3 (8-octet MIC),
+ * L=1 (2-octet Dlen))
+ * Nonce: 0x00 | A2 | PN
+ * Dlen */
+ b0[0] = 0x59;
+ /* NB: b0[1] set below */
+ AIRPDCAP_ADDR_COPY(b0 + 2, wh->addr2);
+ b0[8] = (UINT8)(pn >> 40);
+ b0[9] = (UINT8)(pn >> 32);
+ b0[10] = (UINT8)(pn >> 24);
+ b0[11] = (UINT8)(pn >> 16);
+ b0[12] = (UINT8)(pn >> 8);
+ b0[13] = (UINT8)(pn >> 0);
+ b0[14] = (UINT8)((UINT8)(dlen >> 8) & 0xff);
+ b0[15] = (UINT8)(dlen & 0xff);
+
+ /* AAD:
+ * FC with bits 4..6 and 11..13 masked to zero; 14 is always one
+ * A1 | A2 | A3
+ * SC with bits 4..15 (seq#) masked to zero
+ * A4 (if present)
+ * QC (if present)
+ */
+ aad[0] = 0; /* AAD length >> 8 */
+ /* NB: aad[1] set below */
+ aad[2] = (UINT8)(wh->fc[0] & 0x8f); /* XXX magic #s */
+ aad[3] = (UINT8)(wh->fc[1] & 0xc7); /* XXX magic #s */
+ /* NB: we know 3 addresses are contiguous */
+ memcpy(aad + 4, wh->addr1, 3 * AIRPDCAP_MAC_LEN);
+ aad[22] = (UINT8)(wh->seq[0] & AIRPDCAP_SEQ_FRAG_MASK);
+ aad[23] = 0; /* all bits masked */
+ /*
+ * Construct variable-length portion of AAD based
+ * on whether this is a 4-address frame/QOS frame.
+ * We always zero-pad to 32 bytes before running it
+ * through the cipher.
+ *
+ * We also fill in the priority bits of the CCM
+ * initial block as we know whether or not we have
+ * a QOS frame.
+ */
+ if (IS_4ADDRESS(wh)) {
+ AIRPDCAP_ADDR_COPY(aad + 24,
+ ((PAIRPDCAP_MAC_FRAME_ADDR4)wh)->addr4);
+ if (IS_QOS_DATA(wh)) {
+ PAIRPDCAP_MAC_FRAME_ADDR4_QOS qwh4 =
+ (PAIRPDCAP_MAC_FRAME_ADDR4_QOS) wh;
+ aad[30] = (UINT8)(qwh4->qos[0] & 0x0f);/* just priority bits */
+ aad[31] = 0;
+ b0[1] = aad[30];
+ aad[1] = 22 + AIRPDCAP_MAC_LEN + 2;
+ } else {
+ *(UINT16 *)&aad[30] = 0;
+ b0[1] = 0;
+ aad[1] = 22 + AIRPDCAP_MAC_LEN;
+ }
+ } else {
+ if (IS_QOS_DATA(wh)) {
+ PAIRPDCAP_MAC_FRAME_QOS qwh =
+ (PAIRPDCAP_MAC_FRAME_QOS) wh;
+ aad[24] = (UINT8)(qwh->qos[0] & 0x0f); /* just priority bits */
+ aad[25] = 0;
+ b0[1] = aad[24];
+ aad[1] = 22 + 2;
+ } else {
+ *(UINT16 *)&aad[24] = 0;
+ b0[1] = 0;
+ aad[1] = 22;
+ }
+ *(UINT16 *)&aad[26] = 0;
+ *(UINT16 *)&aad[28] = 0;
+ }
+
+ /* Start with the first block and AAD */
+ rijndael_encrypt(ctx, b0, a);
+ xor_block(a, aad, AES_BLOCK_LEN);
+ rijndael_encrypt(ctx, a, a);
+ xor_block(a, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN);
+ rijndael_encrypt(ctx, a, a);
+ b0[0] &= 0x07;
+ b0[14] = b0[15] = 0;
+ rijndael_encrypt(ctx, b0, b);
+
+ //XOR( m + len - 8, b, 8 );
+#undef IS_QOS_DATA
+#undef IS_4ADDRESS
+}
+
+INT AirPDcapCcmpDecrypt(
+ UINT8 *m,
+ INT len,
+ UCHAR TK1[16])
+{
+ PAIRPDCAP_MAC_FRAME wh;
+ UINT8 aad[2 * AES_BLOCK_LEN];
+ UINT8 b0[AES_BLOCK_LEN], b[AES_BLOCK_LEN], a[AES_BLOCK_LEN];
+ UINT8 mic[AES_BLOCK_LEN];
+ size_t data_len;
+ UINT i;
+ UINT8 *pos;
+ UINT space;
+ INT z=AIRPDCAP_HEADER_LEN(m[1]);
+ rijndael_ctx key;
+ UCHAR PN[6];
+ UINT64 tPN;
+ UINT8 *ivp=m+z;
+
+ tPN = READ_6(ivp[0], ivp[1], ivp[4], ivp[5], ivp[6], ivp[7]);
+ memcpy(PN, &tPN, 6);
+
+ /* freebsd */
+ rijndael_set_key(&key, TK1, 128);
+ wh = (PAIRPDCAP_MAC_FRAME )m;
+ data_len = len - (z + AIRPDCAP_CCMP_HEADER+AIRPDCAP_CCMP_TRAILER);
+ ccmp_init_blocks(&key, wh, *(UINT64 *)PN, data_len, b0, aad, a, b);
+ memcpy(mic, m+len-AIRPDCAP_CCMP_TRAILER, AIRPDCAP_CCMP_TRAILER);
+ xor_block(mic, b, AIRPDCAP_CCMP_TRAILER);
+
+ i = 1;
+ pos = (UINT8 *)m + z + AIRPDCAP_CCMP_HEADER;
+ space = len - (z + AIRPDCAP_CCMP_HEADER);
+
+ if (space > data_len)
+ space = (UINT)data_len;
+ while (space >= AES_BLOCK_LEN) {
+ CCMP_DECRYPT(i, b, b0, pos, a, AES_BLOCK_LEN);
+ pos += AES_BLOCK_LEN, space -= AES_BLOCK_LEN;
+ data_len -= AES_BLOCK_LEN;
+ i++;
+ }
+
+ if (space != 0) /* short last block */
+ CCMP_DECRYPT(i, b, b0, pos, a, space);
+
+ /* MIC Key ?= MIC */
+ if (memcmp(mic, a, AIRPDCAP_CCMP_TRAILER) == 0) {
+ return 0;
+ }
+
+ /* TODO replay check (IEEE 802.11i-2004, pg. 62) */
+ /* TODO PN must be incremental (IEEE 802.11i-2004, pg. 62) */
+
+ return 1;
+}
diff --git a/epan/crypt/airpdcap_ccmp.h b/epan/crypt/airpdcap_ccmp.h
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/epan/crypt/airpdcap_ccmp.h
diff --git a/epan/crypt/airpdcap_debug.c b/epan/crypt/airpdcap_debug.c
new file mode 100644
index 0000000000..6b6125ef5c
--- /dev/null
+++ b/epan/crypt/airpdcap_debug.c
@@ -0,0 +1,21 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+#ifdef _DEBUG
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+ void print_debug_line(CHAR *function, CHAR *msg, INT level) {
+ if (level<=AIRPDCAP_DEBUG_USED_LEVEL)
+ printf("dbg(%d)|(%s) %s\n", level, function, msg);
+ }
+#ifdef __cplusplus
+}
+#endif
+
+#endif
diff --git a/epan/crypt/airpdcap_debug.h b/epan/crypt/airpdcap_debug.h
new file mode 100644
index 0000000000..c41caaeef7
--- /dev/null
+++ b/epan/crypt/airpdcap_debug.h
@@ -0,0 +1,70 @@
+#ifndef _AIRPDCAP_DEBUG_H
+#define _AIRPDCAP_DEBUG_H
+
+#include "airpdcap_interop.h"
+
+void print_debug_line(CHAR *function, CHAR *msg, INT level);
+
+#ifdef _DEBUG
+#ifdef __FUNCTION__
+#define AIRPDCAP_DEBUG_PRINT_LINE(notdefined, msg, level) print_debug_line(__FUNCTION__, msg, level);
+#else
+#define AIRPDCAP_DEBUG_PRINT_LINE(function, msg, level) print_debug_line(function, msg, level);
+#endif
+#else
+#ifdef __FUNCTION__
+#define AIRPDCAP_DEBUG_PRINT_LINE(notdefined, msg, level)
+#else
+#define AIRPDCAP_DEBUG_PRINT_LINE(function, msg, level)
+#endif
+#endif
+
+/******************************************************************************/
+/* Debug section: internal function to print debug information */
+/* */
+#ifdef _DEBUG
+#include "stdio.h"
+#include <time.h>
+
+/* Debug level definition */
+#define AIRPDCAP_DEBUG_LEVEL_1 1
+#define AIRPDCAP_DEBUG_LEVEL_2 2
+#define AIRPDCAP_DEBUG_LEVEL_3 3
+#define AIRPDCAP_DEBUG_LEVEL_4 4
+#define AIRPDCAP_DEBUG_LEVEL_5 5
+
+#define AIRPDCAP_DEBUG_USED_LEVEL AIRPDCAP_DEBUG_LEVEL_3
+
+#ifdef _TRACE
+#ifdef __FUNCTION__
+#define AIRPDCAP_DEBUG_TRACE_START(notdefined) print_debug_line(__FUNCTION__, "Start!", AIRPDCAP_DEBUG_USED_LEVEL);
+#define AIRPDCAP_DEBUG_TRACE_END(notdefined) print_debug_line(__FUNCTION__, "End!", AIRPDCAP_DEBUG_USED_LEVEL);
+#else
+#define AIRPDCAP_DEBUG_TRACE_START(function) print_debug_line(function, "Start!", AIRPDCAP_DEBUG_USED_LEVEL);
+#define AIRPDCAP_DEBUG_TRACE_END(function) print_debug_line(function, "End!", AIRPDCAP_DEBUG_USED_LEVEL);
+#endif
+#else
+#ifdef __FUNCTION__
+#define AIRPDCAP_DEBUG_TRACE_START(notdefined)
+#define AIRPDCAP_DEBUG_TRACE_END(notdefined)
+#else
+#define AIRPDCAP_DEBUG_TRACE_START(function)
+#define AIRPDCAP_DEBUG_TRACE_END(function)
+#endif
+#endif
+
+#else /* !defined _DEBUG */
+
+#define AIRPDCAP_DEBUG_LEVEL_1
+#define AIRPDCAP_DEBUG_LEVEL_2
+#define AIRPDCAP_DEBUG_LEVEL_3
+#define AIRPDCAP_DEBUG_LEVEL_4
+#define AIRPDCAP_DEBUG_LEVEL_5
+
+#define AIRPDCAP_DEBUG_TRACE_START(function)
+#define AIRPDCAP_DEBUG_TRACE_END(function)
+
+#endif /* ?defined _DEBUG */
+
+
+#endif /* ?defined _AIRPDCAP_DEBUG_H */
diff --git a/epan/crypt/airpdcap_int.h b/epan/crypt/airpdcap_int.h
new file mode 100644
index 0000000000..6424be6731
--- /dev/null
+++ b/epan/crypt/airpdcap_int.h
@@ -0,0 +1,113 @@
+#ifndef _AIRPDCAP_INT_H
+#define _AIRPDCAP_INT_H
+
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_interop.h"
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Definitions */
+/* */
+/* IEEE 802.11 packet type values */
+#define AIRPDCAP_TYPE_MANAGEMENT 0
+#define AIRPDCAP_TYPE_CONTROL 1
+#define AIRPDCAP_TYPE_DATA 2
+
+/* Min length of encrypted data (TKIP=25bytes, CCMP=21bytes) */
+#define AIRPDCAP_CRYPTED_DATA_MINLEN 21
+
+#define AIRPDCAP_TA_OFFSET 10
+
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Macro definitions */
+/* */
+/* Macro to get MAC header length (if ToDS and FromDS are set, there is the address 4) */
+#define AIRPDCAP_HEADER_LEN(FrameControl_1) (UINT8)((FrameControl_1 & 0x3)==3 ? 30 : 24)
+
+/* Macro to get various bits of a 802.11 control frame */
+#define AIRPDCAP_TYPE(FrameControl_0) (UINT8)((FrameControl_0 >> 2) & 0x3)
+#define AIRPDCAP_SUBTYPE(FrameControl_0) (UINT8)((FrameControl_0 >> 4) & 0xF)
+#define AIRPDCAP_TO_DS(FrameControl_1) (UINT8)(FrameControl_1 & 0x1)
+#define AIRPDCAP_FROM_DS(FrameControl_1) (UINT8)((FrameControl_1 >> 1) & 0x1)
+#define AIRPDCAP_WEP(FrameControl_1) (UINT8)((FrameControl_1 >> 6) & 0x1)
+/*!
+/brief
+it gets the Key ID from the Initialization Vector (last byte)
+*/
+#define AIRPDCAP_EXTIV(KeyID) ((KeyID >> 5) & 0x1)
+
+/* Macro to get various bits of an EAPOL frame */
+#define AIRPDCAP_EAP_KEY_DESCR_VER(KeyInfo_1) ((UCHAR)(KeyInfo_1 & 0x3))
+#define AIRPDCAP_EAP_KEY(KeyInfo_1) ((KeyInfo_1 >> 3) & 0x1)
+#define AIRPDCAP_EAP_INST(KeyInfo_1) ((KeyInfo_1 >> 6) & 0x1)
+#define AIRPDCAP_EAP_ACK(KeyInfo_1) ((KeyInfo_1 >> 7) & 0x1)
+#define AIRPDCAP_EAP_MIC(KeyInfo_0) (KeyInfo_0 & 0x1)
+#define AIRPDCAP_EAP_SEC(KeyInfo_0) ((KeyInfo_0 >> 1) & 0x1)
+
+/* Note: copied from net80211/ieee80211_airpdcap_tkip.c */
+#define S_SWAP(a,b) { UINT8 t = S[a]; S[a] = S[b]; S[b] = t; }
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Structure definitions */
+/* */
+#pragma pack(push)
+#pragma pack(1)
+
+/* Definition of IEEE 802.11 frame (without the address 4) */
+typedef struct _AIRPDCAP_MAC_FRAME {
+ UCHAR fc[2];
+ UCHAR dur[2];
+ UCHAR addr1[AIRPDCAP_MAC_LEN];
+ UCHAR addr2[AIRPDCAP_MAC_LEN];
+ UCHAR addr3[AIRPDCAP_MAC_LEN];
+ UCHAR seq[2];
+} AIRPDCAP_MAC_FRAME, *PAIRPDCAP_MAC_FRAME;
+
+/* Definition of IEEE 802.11 frame (with the address 4) */
+typedef struct _AIRPDCAP_MAC_FRAME_ADDR4 {
+ UCHAR fc[2];
+ UCHAR dur[2];
+ UCHAR addr1[AIRPDCAP_MAC_LEN];
+ UCHAR addr2[AIRPDCAP_MAC_LEN];
+ UCHAR addr3[AIRPDCAP_MAC_LEN];
+ UCHAR seq[2];
+ UCHAR addr4[AIRPDCAP_MAC_LEN];
+} AIRPDCAP_MAC_FRAME_ADDR4, *PAIRPDCAP_MAC_FRAME_ADDR4;
+
+/* Definition of IEEE 802.11 frame (without the address 4, with QOS) */
+typedef struct _AIRPDCAP_MAC_FRAME_QOS {
+ UCHAR fc[2];
+ UCHAR dur[2];
+ UCHAR addr1[AIRPDCAP_MAC_LEN];
+ UCHAR addr2[AIRPDCAP_MAC_LEN];
+ UCHAR addr3[AIRPDCAP_MAC_LEN];
+ UCHAR seq[2];
+ UCHAR qos[2];
+} AIRPDCAP_MAC_FRAME_QOS, *PAIRPDCAP_MAC_FRAME_QOS;
+
+/* Definition of IEEE 802.11 frame (with the address 4 and QOS) */
+typedef struct _AIRPDCAP_MAC_FRAME_ADDR4_QOS {
+ UCHAR fc[2];
+ UCHAR dur[2];
+ UCHAR addr1[AIRPDCAP_MAC_LEN];
+ UCHAR addr2[AIRPDCAP_MAC_LEN];
+ UCHAR addr3[AIRPDCAP_MAC_LEN];
+ UCHAR seq[2];
+ UCHAR addr4[AIRPDCAP_MAC_LEN];
+ UCHAR qos[2];
+} AIRPDCAP_MAC_FRAME_ADDR4_QOS, *PAIRPDCAP_MAC_FRAME_ADDR4_QOS;
+
+#pragma pack(pop)
+/* */
+/******************************************************************************/
+
+#endif
diff --git a/epan/crypt/airpdcap_interop.h b/epan/crypt/airpdcap_interop.h
new file mode 100644
index 0000000000..e398bf21bf
--- /dev/null
+++ b/epan/crypt/airpdcap_interop.h
@@ -0,0 +1,64 @@
+#ifndef _AIRPDCAP_INTEROP_H
+#define _AIRPDCAP_INTEROP_H
+
+/**
+ * Cast data types commonly used in Windows (e.g. UINT16) to theirf
+ * GLib equivalents.
+ */
+
+#include <glib.h>
+#include <string.h>
+
+#ifndef INT
+typedef gint INT;
+#endif
+
+#ifndef UINT
+typedef guint UINT;
+#endif
+
+#ifndef UINT8
+typedef guint8 UINT8;
+#endif
+
+#ifndef UINT16
+typedef guint16 UINT16;
+#endif
+
+#ifndef UINT32
+typedef guint32 UINT32;
+#endif
+
+#ifndef UINT64
+typedef guint64 UINT64;
+#endif
+
+#ifndef USHORT
+typedef gushort USHORT;
+#endif
+
+#ifndef ULONG
+typedef gulong ULONG;
+#endif
+
+#ifndef ULONGLONG
+typedef guint64 ULONGLONG;
+#endif
+
+#ifndef CHAR
+typedef gchar CHAR;
+#endif
+
+#ifndef UCHAR
+typedef guchar UCHAR;
+#endif
+
+#ifndef size_t
+typedef gsize size_t;
+#endif
+
+#ifndef ntohs
+#define ntohs(value) g_ntohs(value)
+#endif
+
+#endif /* _AIRPDCAP_INTEROP_H */
diff --git a/epan/crypt/airpdcap_md5.c b/epan/crypt/airpdcap_md5.c
new file mode 100644
index 0000000000..aa7a6727ac
--- /dev/null
+++ b/epan/crypt/airpdcap_md5.c
@@ -0,0 +1,450 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_system.h"
+#include "airpdcap_int.h"
+
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* NOTE: All the code listed here has been taken from IETF RFC 1321 (MD5 */
+/* functions) and IETF RFC 2104 (HMAC_MD5 function). Refer to that */
+/* standard for any further information. */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal definitions */
+/* */
+#define S11 7
+#define S12 12
+#define S13 17
+#define S14 22
+#define S21 5
+#define S22 9
+#define S23 14
+#define S24 20
+#define S31 4
+#define S32 11
+#define S33 16
+#define S34 23
+#define S41 6
+#define S42 10
+#define S43 15
+#define S44 21
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal macros */
+/* */
+/* F, G, H and I are basic MD5 functions.
+*/
+#define F(x, y, z) (((x) & (y)) | ((~x) & (z)))
+#define G(x, y, z) (((x) & (z)) | ((y) & (~z)))
+#define H(x, y, z) ((x) ^ (y) ^ (z))
+#define I(x, y, z) ((y) ^ ((x) | (~z)))
+
+/* ROTATE_LEFT rotates x left n bits.
+*/
+#define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n))))
+
+/* FF, GG, HH, and II transformations for rounds 1, 2, 3, and 4.
+Rotation is separate from addition to prevent recomputation.
+*/
+#define FF(a, b, c, d, x, s, ac) { \
+ (a) += F ((b), (c), (d)) + (x) + (ULONG)(ac); \
+ (a) = ROTATE_LEFT ((a), (s)); \
+ (a) += (b); \
+ }
+#define GG(a, b, c, d, x, s, ac) { \
+ (a) += G ((b), (c), (d)) + (x) + (ULONG)(ac); \
+ (a) = ROTATE_LEFT ((a), (s)); \
+ (a) += (b); \
+ }
+#define HH(a, b, c, d, x, s, ac) { \
+ (a) += H ((b), (c), (d)) + (x) + (ULONG)(ac); \
+ (a) = ROTATE_LEFT ((a), (s)); \
+ (a) += (b); \
+ }
+#define II(a, b, c, d, x, s, ac) { \
+ (a) += I ((b), (c), (d)) + (x) + (ULONG)(ac); \
+ (a) = ROTATE_LEFT ((a), (s)); \
+ (a) += (b); \
+ }
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal type definitions */
+/* */
+/* MD5 context. */
+typedef struct {
+ ULONG state[4]; /* state (ABCD) */
+ ULONG count[2]; /* number of bits, modulo 2^64 (lsb first) */
+ UCHAR buffer[64]; /* input buffer */
+} MD5_CTX;
+
+
+static UCHAR PADDING[64] = {
+ 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
+};
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal function prototypes declarations */
+/* */
+void MD5Final(
+ UCHAR digest[16],
+ MD5_CTX *context)
+ ;
+void MD5Update(
+ MD5_CTX *context,
+ UCHAR *input,
+ UINT inputLen)
+ ;
+void MD5Init(
+ MD5_CTX *context)
+ ;
+static void MD5_memset(
+ UCHAR *output,
+ INT value,
+ UINT len)
+ ;
+static void MD5_memcpy(
+ UCHAR *output,
+ UCHAR *input,
+ UINT len)
+ ;
+static void Decode(
+ ULONG *output,
+ UCHAR *input,
+ UINT len)
+ ;
+static void Encode(
+ UCHAR *output,
+ ULONG *input,
+ UINT len)
+ ;
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Function definitions */
+/* */
+/* Encodes input (ULONG) into output (UCHAR). Assumes len is
+a multiple of 4.
+*/
+static void Encode(
+ UCHAR *output,
+ ULONG *input,
+ UINT len)
+{
+ UINT i, j;
+
+ for (i = 0, j = 0; j < len; i++, j += 4) {
+ output[j] = (UCHAR)(input[i] & 0xff);
+ output[j+1] = (UCHAR)((input[i] >> 8) & 0xff);
+ output[j+2] = (UCHAR)((input[i] >> 16) & 0xff);
+ output[j+3] = (UCHAR)((input[i] >> 24) & 0xff);
+ }
+}
+
+/* Decodes input (UCHAR) into output (ULONG). Assumes len is
+a multiple of 4.
+*/
+static void Decode(
+ ULONG *output,
+ UCHAR *input,
+ UINT len)
+{
+ UINT i, j;
+
+ for (i = 0, j = 0; j < len; i++, j += 4)
+ output[i] = ((ULONG)input[j]) | (((ULONG)input[j+1]) << 8) |
+ (((ULONG)input[j+2]) << 16) | (((ULONG)input[j+3]) << 24);
+}
+
+/* Note: Replace "for loop" with standard memcpy if possible.
+*/
+
+static void MD5_memcpy(
+ UCHAR *output,
+ UCHAR *input,
+ UINT len)
+{
+ UINT i;
+
+ for (i = 0; i < len; i++)
+ output[i] = input[i];
+}
+
+/* Note: Replace "for loop" with standard memset if possible.
+*/
+static void MD5_memset(
+ UCHAR *output,
+ INT value,
+ UINT len)
+{
+ UINT i;
+
+ for (i = 0; i < len; i++)
+ ((CHAR *)output)[i] = (CHAR)value;
+}
+
+/* MD5 basic transformation. Transforms state based on block.
+*/
+static void MD5Transform(
+ ULONG state[4],
+ UCHAR block[64])
+{
+ ULONG a = state[0], b = state[1], c = state[2], d = state[3], x[16];
+
+ Decode (x, block, 64);
+
+ /* Round 1 */
+ FF (a, b, c, d, x[ 0], S11, 0xd76aa478); /* 1 */
+ FF (d, a, b, c, x[ 1], S12, 0xe8c7b756); /* 2 */
+ FF (c, d, a, b, x[ 2], S13, 0x242070db); /* 3 */
+ FF (b, c, d, a, x[ 3], S14, 0xc1bdceee); /* 4 */
+ FF (a, b, c, d, x[ 4], S11, 0xf57c0faf); /* 5 */
+ FF (d, a, b, c, x[ 5], S12, 0x4787c62a); /* 6 */
+ FF (c, d, a, b, x[ 6], S13, 0xa8304613); /* 7 */
+ FF (b, c, d, a, x[ 7], S14, 0xfd469501); /* 8 */
+ FF (a, b, c, d, x[ 8], S11, 0x698098d8); /* 9 */
+ FF (d, a, b, c, x[ 9], S12, 0x8b44f7af); /* 10 */
+ FF (c, d, a, b, x[10], S13, 0xffff5bb1); /* 11 */
+ FF (b, c, d, a, x[11], S14, 0x895cd7be); /* 12 */
+ FF (a, b, c, d, x[12], S11, 0x6b901122); /* 13 */
+ FF (d, a, b, c, x[13], S12, 0xfd987193); /* 14 */
+ FF (c, d, a, b, x[14], S13, 0xa679438e); /* 15 */
+ FF (b, c, d, a, x[15], S14, 0x49b40821); /* 16 */
+
+ /* Round 2 */
+ GG (a, b, c, d, x[ 1], S21, 0xf61e2562); /* 17 */
+ GG (d, a, b, c, x[ 6], S22, 0xc040b340); /* 18 */
+ GG (c, d, a, b, x[11], S23, 0x265e5a51); /* 19 */
+ GG (b, c, d, a, x[ 0], S24, 0xe9b6c7aa); /* 20 */
+ GG (a, b, c, d, x[ 5], S21, 0xd62f105d); /* 21 */
+ GG (d, a, b, c, x[10], S22, 0x2441453); /* 22 */
+ GG (c, d, a, b, x[15], S23, 0xd8a1e681); /* 23 */
+ GG (b, c, d, a, x[ 4], S24, 0xe7d3fbc8); /* 24 */
+ GG (a, b, c, d, x[ 9], S21, 0x21e1cde6); /* 25 */
+ GG (d, a, b, c, x[14], S22, 0xc33707d6); /* 26 */
+ GG (c, d, a, b, x[ 3], S23, 0xf4d50d87); /* 27 */
+ GG (b, c, d, a, x[ 8], S24, 0x455a14ed); /* 28 */
+ GG (a, b, c, d, x[13], S21, 0xa9e3e905); /* 29 */
+ GG (d, a, b, c, x[ 2], S22, 0xfcefa3f8); /* 30 */
+ GG (c, d, a, b, x[ 7], S23, 0x676f02d9); /* 31 */
+ GG (b, c, d, a, x[12], S24, 0x8d2a4c8a); /* 32 */
+
+ /* Round 3 */
+ HH (a, b, c, d, x[ 5], S31, 0xfffa3942); /* 33 */
+ HH (d, a, b, c, x[ 8], S32, 0x8771f681); /* 34 */
+ HH (c, d, a, b, x[11], S33, 0x6d9d6122); /* 35 */
+ HH (b, c, d, a, x[14], S34, 0xfde5380c); /* 36 */
+ HH (a, b, c, d, x[ 1], S31, 0xa4beea44); /* 37 */
+ HH (d, a, b, c, x[ 4], S32, 0x4bdecfa9); /* 38 */
+ HH (c, d, a, b, x[ 7], S33, 0xf6bb4b60); /* 39 */
+ HH (b, c, d, a, x[10], S34, 0xbebfbc70); /* 40 */
+ HH (a, b, c, d, x[13], S31, 0x289b7ec6); /* 41 */
+ HH (d, a, b, c, x[ 0], S32, 0xeaa127fa); /* 42 */
+ HH (c, d, a, b, x[ 3], S33, 0xd4ef3085); /* 43 */
+ HH (b, c, d, a, x[ 6], S34, 0x4881d05); /* 44 */
+ HH (a, b, c, d, x[ 9], S31, 0xd9d4d039); /* 45 */
+ HH (d, a, b, c, x[12], S32, 0xe6db99e5); /* 46 */
+ HH (c, d, a, b, x[15], S33, 0x1fa27cf8); /* 47 */
+ HH (b, c, d, a, x[ 2], S34, 0xc4ac5665); /* 48 */
+
+ /* Round 4 */
+ II (a, b, c, d, x[ 0], S41, 0xf4292244); /* 49 */
+ II (d, a, b, c, x[ 7], S42, 0x432aff97); /* 50 */
+ II (c, d, a, b, x[14], S43, 0xab9423a7); /* 51 */
+ II (b, c, d, a, x[ 5], S44, 0xfc93a039); /* 52 */
+ II (a, b, c, d, x[12], S41, 0x655b59c3); /* 53 */
+ II (d, a, b, c, x[ 3], S42, 0x8f0ccc92); /* 54 */
+ II (c, d, a, b, x[10], S43, 0xffeff47d); /* 55 */
+ II (b, c, d, a, x[ 1], S44, 0x85845dd1); /* 56 */
+ II (a, b, c, d, x[ 8], S41, 0x6fa87e4f); /* 57 */
+ II (d, a, b, c, x[15], S42, 0xfe2ce6e0); /* 58 */
+ II (c, d, a, b, x[ 6], S43, 0xa3014314); /* 59 */
+ II (b, c, d, a, x[13], S44, 0x4e0811a1); /* 60 */
+ II (a, b, c, d, x[ 4], S41, 0xf7537e82); /* 61 */
+ II (d, a, b, c, x[11], S42, 0xbd3af235); /* 62 */
+ II (c, d, a, b, x[ 2], S43, 0x2ad7d2bb); /* 63 */
+ II (b, c, d, a, x[ 9], S44, 0xeb86d391); /* 64 */
+
+ state[0] += a;
+ state[1] += b;
+ state[2] += c;
+ state[3] += d;
+
+ /* Zeroize sensitive information.
+ */
+ MD5_memset ((UCHAR *)x, 0, sizeof (x));
+}
+
+/* MD5 initialization. Begins an MD5 operation, writing a new context.
+*/
+void MD5Init(
+ MD5_CTX *context)
+{
+ memset(context, 0, sizeof(context));
+
+ context->count[0] = context->count[1] = 0;
+ /* Load magic initialization constants.
+ */
+ context->state[0] = 0x67452301;
+ context->state[1] = 0xefcdab89;
+ context->state[2] = 0x98badcfe;
+ context->state[3] = 0x10325476;
+}
+
+/* MD5 block update operation. Continues an MD5 message-digest
+operation, processing another message block, and updating the
+context.
+*/
+void MD5Update(
+ MD5_CTX *context,
+ UCHAR *input,
+ UINT inputLen)
+{
+ UINT i, index, partLen;
+
+ /* Compute number of bytes mod 64 */
+ index = (UINT)((context->count[0] >> 3) & 0x3F);
+
+ /* Update number of bits */
+ if ((context->count[0] += ((ULONG)inputLen << 3))
+ < ((ULONG)inputLen << 3))
+ context->count[1]++;
+ context->count[1] += ((ULONG)inputLen >> 29);
+
+ partLen = 64 - index;
+
+ /* Transform as many times as possible.
+ */
+ if (inputLen >= partLen) {
+ MD5_memcpy
+ ((UCHAR *)&context->buffer[index], (UCHAR *)input, partLen);
+ MD5Transform (context->state, context->buffer);
+
+ for (i = partLen; i + 63 < inputLen; i += 64)
+ MD5Transform (context->state, &input[i]);
+
+ index = 0;
+ }
+ else
+ i = 0;
+
+ /* Buffer remaining input */
+ MD5_memcpy
+ ((UCHAR *)&context->buffer[index], (UCHAR *)&input[i],
+ inputLen-i);
+}
+
+/* MD5 finalization. Ends an MD5 message-digest operation, writing the
+the message digest and zeroizing the context.
+*/
+void MD5Final(
+ UCHAR digest[16],
+ MD5_CTX *context)
+{
+ UCHAR bits[8];
+ UINT index, padLen;
+
+ /* Save number of bits */
+ Encode (bits, context->count, 8);
+
+ /* Pad out to 56 mod 64.
+ */
+ index = (UINT)((context->count[0] >> 3) & 0x3f);
+ padLen = (index < 56) ? (56 - index) : (120 - index);
+ MD5Update (context, PADDING, padLen);
+
+ /* Append length (before padding) */
+ MD5Update (context, bits, 8);
+
+ /* Store state in digest */
+ Encode (digest, context->state, 16);
+
+ /* Zeroize sensitive information.
+ */
+ MD5_memset ((UCHAR *)context, 0, sizeof (*context));
+}
+
+void AirPDcapAlgHmacMd5(
+ UCHAR *key, /* pointer to authentication key */
+ INT key_len, /* length of authentication key */
+ const UCHAR *text, /* pointer to data stream */
+ const INT text_len, /* length of data stream */
+ UCHAR *digest) /* caller digest to be filled in */
+{
+ MD5_CTX context;
+ UCHAR k_ipad[65]; /* inner padding -
+ * key XORd with ipad
+ */
+ UCHAR k_opad[65]; /* outer padding -
+ * key XORd with opad
+ */
+ UCHAR tk[16];
+ INT i;
+ /* if key is longer than 64 bytes reset it to key=MD5(key) */
+ if (key_len > 64) {
+
+ MD5_CTX tctx;
+
+ MD5Init(&tctx);
+ MD5Update(&tctx, key, key_len);
+ MD5Final(tk, &tctx);
+
+ key = tk;
+ key_len = 16;
+ }
+
+ /*
+ * the HMAC_MD5 transform looks like:
+ *
+ * MD5(K XOR opad, MD5(K XOR ipad, text))
+ *
+ * where K is an n byte key
+ * ipad is the byte 0x36 repeated 64 times
+ * opad is the byte 0x5c repeated 64 times
+ * and text is the data being protected
+ */
+
+ /* start out by storing key in pads */
+ memset( k_ipad, 0, sizeof k_ipad);
+ memset( k_opad, 0, sizeof k_opad);
+ memcpy( k_ipad, key, key_len);
+ memcpy( k_opad, key, key_len);
+
+ /* XOR key with ipad and opad values */
+ for (i=0; i<64; i++) {
+ k_ipad[i] ^= 0x36;
+ k_opad[i] ^= 0x5c;
+ }
+ /*
+ * perform inner MD5
+ */
+ MD5Init(&context); /* init context for 1st
+ * pass */
+ MD5Update(&context, k_ipad, 64); /* start with inner pad */
+ MD5Update(&context, (UCHAR *)text, text_len); /* then text of datagram */
+ MD5Final(digest, &context); /* finish up 1st pass */
+ /*
+ * perform outer MD5
+ */
+ MD5Init(&context); /* init context for 2nd
+ * pass */
+ MD5Update(&context, k_opad, 64); /* start with outer pad */
+ MD5Update(&context, digest, 16); /* then results of 1st
+ * hash */
+ MD5Final(digest, &context); /* finish up 2nd pass */
+}
+/* */
+/******************************************************************************/
diff --git a/epan/crypt/airpdcap_md5.h b/epan/crypt/airpdcap_md5.h
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/epan/crypt/airpdcap_md5.h
diff --git a/epan/crypt/airpdcap_rijndael.c b/epan/crypt/airpdcap_rijndael.c
new file mode 100644
index 0000000000..c024a2da35
--- /dev/null
+++ b/epan/crypt/airpdcap_rijndael.c
@@ -0,0 +1,1080 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_rijndael.h"
+
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+/* Note: this code were copied from FreeBSD source code, RELENG 6, */
+/* sys/crypto/rijndael/rijndael-alg-fst.c */
+
+/******************************************************************************/
+/* Internal definitions */
+/* */
+#define FULL_UNROLL
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal macros */
+/* */
+#define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrotr(x, 8) & 0xff00ff00)
+
+#define GETU32(pt) (((UINT32)(pt)[0] << 24) ^ ((UINT32)(pt)[1] << 16) ^ ((UINT32)(pt)[2] << 8) ^ ((UINT32)(pt)[3]))
+
+#define PUTU32(ct, st) { (ct)[0] = (UINT8)((st) >> 24); (ct)[1] = (UINT8)((st) >> 16); (ct)[2] = (UINT8)((st) >> 8); (ct)[3] = (UINT8)(st); }
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal function prototypes declarations */
+/* */
+INT rijndaelKeySetupEnc(
+ UINT32 rk[/*4*(Nr + 1)*/],
+ const UINT8 cipherKey[],
+ INT keyBits)
+ ;
+
+INT rijndaelKeySetupDec(
+ UINT32 rk[/*4*(Nr + 1)*/],
+ const UINT8 cipherKey[],
+ INT keyBits)
+ ;
+
+void rijndaelEncrypt(
+ const UINT32 rk[/*4*(Nr + 1)*/],
+ INT Nr,
+ const UINT8 pt[16],
+ UINT8 ct[16])
+ ;
+
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Global variables */
+/* */
+static const UINT32 Te0[256] = {
+ 0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU,
+ 0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U,
+ 0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU,
+ 0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU,
+ 0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U,
+ 0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU,
+ 0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU,
+ 0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU,
+ 0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU,
+ 0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU,
+ 0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U,
+ 0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU,
+ 0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU,
+ 0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U,
+ 0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU,
+ 0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU,
+ 0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU,
+ 0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU,
+ 0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU,
+ 0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U,
+ 0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU,
+ 0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU,
+ 0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU,
+ 0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU,
+ 0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U,
+ 0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U,
+ 0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U,
+ 0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U,
+ 0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU,
+ 0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U,
+ 0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U,
+ 0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU,
+ 0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU,
+ 0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U,
+ 0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U,
+ 0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U,
+ 0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU,
+ 0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U,
+ 0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU,
+ 0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U,
+ 0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU,
+ 0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U,
+ 0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U,
+ 0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU,
+ 0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U,
+ 0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U,
+ 0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U,
+ 0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U,
+ 0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U,
+ 0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U,
+ 0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U,
+ 0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U,
+ 0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU,
+ 0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U,
+ 0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U,
+ 0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U,
+ 0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U,
+ 0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U,
+ 0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U,
+ 0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU,
+ 0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U,
+ 0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U,
+ 0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U,
+ 0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU,
+};
+
+static const UINT32 Te1[256] = {
+ 0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU,
+ 0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U,
+ 0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU,
+ 0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U,
+ 0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU,
+ 0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U,
+ 0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU,
+ 0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U,
+ 0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U,
+ 0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU,
+ 0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U,
+ 0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U,
+ 0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U,
+ 0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU,
+ 0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U,
+ 0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U,
+ 0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU,
+ 0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U,
+ 0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U,
+ 0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U,
+ 0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU,
+ 0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU,
+ 0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U,
+ 0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU,
+ 0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU,
+ 0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U,
+ 0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU,
+ 0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U,
+ 0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU,
+ 0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U,
+ 0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U,
+ 0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U,
+ 0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU,
+ 0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U,
+ 0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU,
+ 0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U,
+ 0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU,
+ 0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U,
+ 0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U,
+ 0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU,
+ 0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU,
+ 0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU,
+ 0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U,
+ 0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U,
+ 0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU,
+ 0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U,
+ 0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU,
+ 0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U,
+ 0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU,
+ 0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U,
+ 0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU,
+ 0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU,
+ 0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U,
+ 0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU,
+ 0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U,
+ 0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU,
+ 0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U,
+ 0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U,
+ 0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U,
+ 0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU,
+ 0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU,
+ 0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U,
+ 0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU,
+ 0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U,
+};
+
+static const UINT32 Te2[256] = {
+ 0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU,
+ 0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U,
+ 0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU,
+ 0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U,
+ 0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU,
+ 0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U,
+ 0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU,
+ 0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U,
+ 0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U,
+ 0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU,
+ 0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U,
+ 0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U,
+ 0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U,
+ 0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU,
+ 0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U,
+ 0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U,
+ 0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU,
+ 0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U,
+ 0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U,
+ 0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U,
+ 0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU,
+ 0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU,
+ 0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U,
+ 0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU,
+ 0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU,
+ 0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U,
+ 0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU,
+ 0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U,
+ 0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU,
+ 0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U,
+ 0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U,
+ 0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U,
+ 0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU,
+ 0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U,
+ 0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU,
+ 0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U,
+ 0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU,
+ 0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U,
+ 0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U,
+ 0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU,
+ 0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU,
+ 0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU,
+ 0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U,
+ 0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U,
+ 0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU,
+ 0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U,
+ 0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU,
+ 0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U,
+ 0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU,
+ 0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U,
+ 0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU,
+ 0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU,
+ 0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U,
+ 0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU,
+ 0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U,
+ 0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU,
+ 0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U,
+ 0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U,
+ 0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U,
+ 0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU,
+ 0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU,
+ 0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U,
+ 0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU,
+ 0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U,
+};
+
+static const UINT32 Te3[256] = {
+ 0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U,
+ 0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U,
+ 0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U,
+ 0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU,
+ 0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU,
+ 0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU,
+ 0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U,
+ 0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU,
+ 0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU,
+ 0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U,
+ 0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U,
+ 0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU,
+ 0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU,
+ 0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU,
+ 0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU,
+ 0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU,
+ 0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U,
+ 0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU,
+ 0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU,
+ 0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U,
+ 0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U,
+ 0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U,
+ 0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U,
+ 0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U,
+ 0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU,
+ 0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U,
+ 0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU,
+ 0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU,
+ 0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U,
+ 0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U,
+ 0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U,
+ 0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU,
+ 0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U,
+ 0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU,
+ 0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU,
+ 0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U,
+ 0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U,
+ 0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU,
+ 0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U,
+ 0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU,
+ 0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U,
+ 0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U,
+ 0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U,
+ 0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U,
+ 0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU,
+ 0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U,
+ 0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU,
+ 0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U,
+ 0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU,
+ 0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U,
+ 0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU,
+ 0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU,
+ 0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU,
+ 0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU,
+ 0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U,
+ 0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U,
+ 0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U,
+ 0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U,
+ 0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U,
+ 0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U,
+ 0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU,
+ 0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U,
+ 0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU,
+ 0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU,
+};
+
+static const UINT32 Te4[256] = {
+ 0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU,
+ 0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U,
+ 0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU,
+ 0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U,
+ 0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU,
+ 0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U,
+ 0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU,
+ 0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U,
+ 0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U,
+ 0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU,
+ 0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U,
+ 0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U,
+ 0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U,
+ 0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU,
+ 0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U,
+ 0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U,
+ 0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU,
+ 0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U,
+ 0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U,
+ 0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U,
+ 0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU,
+ 0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU,
+ 0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U,
+ 0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU,
+ 0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU,
+ 0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U,
+ 0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU,
+ 0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U,
+ 0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU,
+ 0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U,
+ 0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U,
+ 0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U,
+ 0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU,
+ 0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U,
+ 0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU,
+ 0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U,
+ 0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU,
+ 0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U,
+ 0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U,
+ 0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU,
+ 0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU,
+ 0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU,
+ 0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U,
+ 0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U,
+ 0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU,
+ 0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U,
+ 0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU,
+ 0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U,
+ 0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU,
+ 0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U,
+ 0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU,
+ 0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU,
+ 0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U,
+ 0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU,
+ 0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U,
+ 0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU,
+ 0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U,
+ 0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U,
+ 0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U,
+ 0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU,
+ 0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU,
+ 0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U,
+ 0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU,
+ 0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U,
+};
+
+static const UINT32 Td0[256] = {
+ 0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U,
+ 0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U,
+ 0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U,
+ 0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU,
+ 0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U,
+ 0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U,
+ 0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU,
+ 0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U,
+ 0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU,
+ 0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U,
+ 0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U,
+ 0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U,
+ 0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U,
+ 0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU,
+ 0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U,
+ 0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU,
+ 0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U,
+ 0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU,
+ 0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U,
+ 0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U,
+ 0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U,
+ 0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU,
+ 0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U,
+ 0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU,
+ 0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U,
+ 0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU,
+ 0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U,
+ 0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU,
+ 0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU,
+ 0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U,
+ 0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU,
+ 0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U,
+ 0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU,
+ 0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U,
+ 0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U,
+ 0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U,
+ 0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU,
+ 0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U,
+ 0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U,
+ 0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU,
+ 0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U,
+ 0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U,
+ 0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U,
+ 0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U,
+ 0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U,
+ 0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU,
+ 0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U,
+ 0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U,
+ 0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U,
+ 0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U,
+ 0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U,
+ 0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU,
+ 0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU,
+ 0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU,
+ 0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU,
+ 0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U,
+ 0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U,
+ 0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU,
+ 0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU,
+ 0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U,
+ 0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU,
+ 0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U,
+ 0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U,
+ 0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U,
+};
+
+static const UINT32 Td1[256] = {
+ 0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU,
+ 0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U,
+ 0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU,
+ 0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U,
+ 0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U,
+ 0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U,
+ 0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U,
+ 0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U,
+ 0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U,
+ 0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU,
+ 0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU,
+ 0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU,
+ 0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U,
+ 0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU,
+ 0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U,
+ 0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U,
+ 0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U,
+ 0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU,
+ 0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU,
+ 0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U,
+ 0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU,
+ 0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U,
+ 0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU,
+ 0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU,
+ 0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U,
+ 0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U,
+ 0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U,
+ 0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU,
+ 0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U,
+ 0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU,
+ 0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U,
+ 0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U,
+ 0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U,
+ 0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU,
+ 0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U,
+ 0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U,
+ 0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U,
+ 0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U,
+ 0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U,
+ 0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U,
+ 0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU,
+ 0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU,
+ 0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U,
+ 0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU,
+ 0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U,
+ 0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU,
+ 0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU,
+ 0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U,
+ 0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU,
+ 0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U,
+ 0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U,
+ 0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U,
+ 0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U,
+ 0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U,
+ 0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U,
+ 0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U,
+ 0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU,
+ 0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U,
+ 0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U,
+ 0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU,
+ 0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U,
+ 0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U,
+ 0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U,
+ 0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U,
+};
+
+static const UINT32 Td2[256] = {
+ 0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U,
+ 0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U,
+ 0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U,
+ 0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U,
+ 0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU,
+ 0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U,
+ 0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U,
+ 0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U,
+ 0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U,
+ 0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU,
+ 0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U,
+ 0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U,
+ 0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU,
+ 0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U,
+ 0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U,
+ 0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U,
+ 0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U,
+ 0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U,
+ 0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U,
+ 0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU,
+
+ 0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U,
+ 0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U,
+ 0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U,
+ 0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U,
+ 0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U,
+ 0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU,
+ 0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU,
+ 0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U,
+ 0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU,
+ 0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U,
+ 0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU,
+ 0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU,
+ 0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU,
+ 0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU,
+ 0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U,
+ 0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U,
+ 0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U,
+ 0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U,
+ 0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U,
+ 0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U,
+ 0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U,
+ 0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU,
+ 0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU,
+ 0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U,
+ 0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U,
+ 0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU,
+ 0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU,
+ 0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U,
+ 0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U,
+ 0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U,
+ 0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U,
+ 0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U,
+ 0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U,
+ 0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U,
+ 0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU,
+ 0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U,
+ 0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U,
+ 0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U,
+ 0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U,
+ 0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U,
+ 0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U,
+ 0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU,
+ 0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U,
+ 0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U,
+};
+
+static const UINT32 Td3[256] = {
+ 0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU,
+ 0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU,
+ 0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U,
+ 0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U,
+ 0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU,
+ 0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU,
+ 0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U,
+ 0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU,
+ 0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U,
+ 0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU,
+ 0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U,
+ 0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U,
+ 0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U,
+ 0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U,
+ 0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U,
+ 0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU,
+ 0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU,
+ 0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U,
+ 0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U,
+ 0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU,
+ 0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU,
+ 0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U,
+ 0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U,
+ 0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U,
+ 0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U,
+ 0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU,
+ 0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U,
+ 0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U,
+ 0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU,
+ 0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU,
+ 0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U,
+ 0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U,
+ 0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U,
+ 0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU,
+ 0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U,
+ 0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U,
+ 0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U,
+ 0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U,
+ 0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U,
+ 0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U,
+ 0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U,
+ 0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU,
+ 0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U,
+ 0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U,
+ 0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU,
+ 0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU,
+ 0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U,
+ 0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU,
+ 0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U,
+ 0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U,
+ 0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U,
+ 0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U,
+ 0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U,
+ 0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U,
+ 0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU,
+ 0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU,
+ 0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU,
+ 0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU,
+ 0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U,
+ 0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U,
+ 0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U,
+ 0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU,
+ 0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U,
+ 0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U,
+};
+
+static const UINT32 Td4[256] = {
+ 0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U,
+ 0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U,
+ 0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU,
+ 0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU,
+ 0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U,
+ 0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U,
+ 0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U,
+ 0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU,
+ 0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U,
+ 0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU,
+ 0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU,
+ 0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU,
+ 0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U,
+ 0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U,
+ 0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U,
+ 0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U,
+ 0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U,
+ 0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U,
+ 0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU,
+ 0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U,
+ 0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U,
+ 0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU,
+ 0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U,
+ 0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U,
+ 0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U,
+ 0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU,
+ 0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U,
+ 0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U,
+ 0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU,
+ 0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U,
+ 0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U,
+ 0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU,
+ 0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U,
+ 0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU,
+ 0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU,
+ 0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U,
+ 0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U,
+ 0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U,
+ 0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U,
+ 0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU,
+ 0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U,
+ 0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U,
+ 0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU,
+ 0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU,
+ 0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU,
+ 0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U,
+ 0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU,
+ 0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U,
+ 0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U,
+ 0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U,
+ 0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U,
+ 0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU,
+ 0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U,
+ 0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU,
+ 0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU,
+ 0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU,
+ 0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU,
+ 0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U,
+ 0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU,
+ 0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U,
+ 0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU,
+ 0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U,
+ 0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U,
+ 0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU,
+};
+
+static const UINT32 rcon[] = {
+ 0x01000000, 0x02000000, 0x04000000, 0x08000000,
+ 0x10000000, 0x20000000, 0x40000000, 0x80000000,
+ 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
+};
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Fuction definitions */
+/* */
+INT rijndaelKeySetupEnc(
+ UINT32 rk[/*4*(Nr + 1)*/],
+ const UINT8 cipherKey[],
+ INT keyBits)
+{
+ INT i = 0;
+ UINT32 temp;
+
+ if (!(keyBits == 128 || keyBits == 192 || keyBits == 256))
+ return -1;
+
+ rk[0] = GETU32(cipherKey );
+ rk[1] = GETU32(cipherKey + 4);
+ rk[2] = GETU32(cipherKey + 8);
+ rk[3] = GETU32(cipherKey + 12);
+ if (keyBits == 128) {
+ for (;;) {
+ temp = rk[3];
+ rk[4] = rk[0] ^
+ (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
+ (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
+ (Te4[(temp ) & 0xff] & 0x0000ff00) ^
+ (Te4[(temp >> 24) ] & 0x000000ff) ^
+ rcon[i];
+ rk[5] = rk[1] ^ rk[4];
+ rk[6] = rk[2] ^ rk[5];
+ rk[7] = rk[3] ^ rk[6];
+ if (++i == 10) {
+ return 10;
+ }
+ rk += 4;
+ }
+ }
+ rk[4] = GETU32(cipherKey + 16);
+ rk[5] = GETU32(cipherKey + 20);
+ if (keyBits == 192) {
+ for (;;) {
+ temp = rk[ 5];
+ rk[ 6] = rk[ 0] ^
+ (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
+ (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
+ (Te4[(temp ) & 0xff] & 0x0000ff00) ^
+ (Te4[(temp >> 24) ] & 0x000000ff) ^
+ rcon[i];
+ rk[ 7] = rk[ 1] ^ rk[ 6];
+ rk[ 8] = rk[ 2] ^ rk[ 7];
+ rk[ 9] = rk[ 3] ^ rk[ 8];
+ if (++i == 8) {
+ return 12;
+ }
+ rk[10] = rk[ 4] ^ rk[ 9];
+ rk[11] = rk[ 5] ^ rk[10];
+ rk += 6;
+ }
+ }
+ rk[6] = GETU32(cipherKey + 24);
+ rk[7] = GETU32(cipherKey + 28);
+ if (keyBits == 256) {
+ for (;;) {
+ temp = rk[ 7];
+ rk[ 8] = rk[ 0] ^
+ (Te4[(temp >> 16) & 0xff] & 0xff000000) ^
+ (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^
+ (Te4[(temp ) & 0xff] & 0x0000ff00) ^
+ (Te4[(temp >> 24) ] & 0x000000ff) ^
+ rcon[i];
+ rk[ 9] = rk[ 1] ^ rk[ 8];
+ rk[10] = rk[ 2] ^ rk[ 9];
+ rk[11] = rk[ 3] ^ rk[10];
+ if (++i == 7) {
+ return 14;
+ }
+ temp = rk[11];
+ rk[12] = rk[ 4] ^
+ (Te4[(temp >> 24) ] & 0xff000000) ^
+ (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^
+ (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^
+ (Te4[(temp ) & 0xff] & 0x000000ff);
+ rk[13] = rk[ 5] ^ rk[12];
+ rk[14] = rk[ 6] ^ rk[13];
+ rk[15] = rk[ 7] ^ rk[14];
+
+ rk += 8;
+ }
+ }
+ return 0;
+}
+
+INT rijndaelKeySetupDec(
+ UINT32 rk[/*4*(Nr + 1)*/],
+ const UINT8 cipherKey[],
+ INT keyBits)
+{
+ INT Nr, i, j;
+ UINT32 temp;
+
+ /* expand the cipher key: */
+ Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits);
+ /* invert the order of the round keys: */
+ for (i = 0, j = 4*Nr; i < j; i += 4, j -= 4) {
+ temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp;
+ temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
+ temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
+ temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
+ }
+ /* apply the inverse MixColumn transform to all round keys but the first and the last: */
+ for (i = 1; i < Nr; i++) {
+ rk += 4;
+ rk[0] =
+ Td0[Te4[(rk[0] >> 24) ] & 0xff] ^
+ Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^
+ Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^
+ Td3[Te4[(rk[0] ) & 0xff] & 0xff];
+ rk[1] =
+ Td0[Te4[(rk[1] >> 24) ] & 0xff] ^
+ Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^
+ Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^
+ Td3[Te4[(rk[1] ) & 0xff] & 0xff];
+ rk[2] =
+ Td0[Te4[(rk[2] >> 24) ] & 0xff] ^
+ Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^
+ Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^
+ Td3[Te4[(rk[2] ) & 0xff] & 0xff];
+ rk[3] =
+ Td0[Te4[(rk[3] >> 24) ] & 0xff] ^
+ Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^
+ Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^
+ Td3[Te4[(rk[3] ) & 0xff] & 0xff];
+ }
+ return Nr;
+}
+
+void rijndael_set_key(
+ rijndael_ctx *ctx,
+ const UCHAR *key,
+ INT bits)
+{
+
+ ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits);
+ rijndaelKeySetupDec(ctx->dk, key, bits);
+}
+
+void rijndaelEncrypt(
+ const UINT32 rk[/*4*(Nr + 1)*/],
+ INT Nr,
+ const UINT8 pt[16],
+ UINT8 ct[16])
+{
+ UINT32 s0, s1, s2, s3, t0, t1, t2, t3;
+#ifndef FULL_UNROLL
+ INT r;
+#endif /* ?FULL_UNROLL */
+
+ /*
+ * map byte array block to cipher state
+ * and add initial round key:
+ */
+ s0 = GETU32(pt ) ^ rk[0];
+ s1 = GETU32(pt + 4) ^ rk[1];
+ s2 = GETU32(pt + 8) ^ rk[2];
+ s3 = GETU32(pt + 12) ^ rk[3];
+#ifdef FULL_UNROLL
+ /* round 1: */
+ t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4];
+ t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5];
+ t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6];
+ t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7];
+ /* round 2: */
+ s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8];
+ s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9];
+ s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10];
+ s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11];
+ /* round 3: */
+ t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12];
+ t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13];
+ t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14];
+ t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[15];
+ /* round 4: */
+ s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16];
+ s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17];
+ s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18];
+ s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[19];
+ /* round 5: */
+ t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[20];
+ t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[21];
+ t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[22];
+ t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[23];
+ /* round 6: */
+ s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[24];
+ s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[25];
+ s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[26];
+ s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[27];
+ /* round 7: */
+ t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[28];
+ t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[29];
+ t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[30];
+ t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[31];
+ /* round 8: */
+ s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[32];
+ s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[33];
+ s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[34];
+ s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[35];
+ /* round 9: */
+ t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[36];
+ t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[37];
+ t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[38];
+ t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[39];
+ if (Nr > 10) {
+ /* round 10: */
+ s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[40];
+ s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[41];
+ s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[42];
+ s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[43];
+ /* round 11: */
+ t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[44];
+ t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[45];
+ t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[46];
+ t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[47];
+ if (Nr > 12) {
+ /* round 12: */
+ s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[48];
+ s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[49];
+ s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[50];
+ s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[51];
+ /* round 13: */
+ t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[52];
+ t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[53];
+ t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[54];
+ t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[55];
+ }
+ }
+ rk += Nr << 2;
+#else /* !FULL_UNROLL */
+ /*
+ * Nr - 1 full rounds:
+ */
+ r = Nr >> 1;
+ for (;;) {
+ t0 =
+ Te0[(s0 >> 24) ] ^
+ Te1[(s1 >> 16) & 0xff] ^
+ Te2[(s2 >> 8) & 0xff] ^
+ Te3[(s3 ) & 0xff] ^
+ rk[4];
+ t1 =
+ Te0[(s1 >> 24) ] ^
+ Te1[(s2 >> 16) & 0xff] ^
+ Te2[(s3 >> 8) & 0xff] ^
+ Te3[(s0 ) & 0xff] ^
+ rk[5];
+ t2 =
+ Te0[(s2 >> 24) ] ^
+ Te1[(s3 >> 16) & 0xff] ^
+ Te2[(s0 >> 8) & 0xff] ^
+ Te3[(s1 ) & 0xff] ^
+ rk[6];
+ t3 =
+ Te0[(s3 >> 24) ] ^
+ Te1[(s0 >> 16) & 0xff] ^
+ Te2[(s1 >> 8) & 0xff] ^
+ Te3[(s2 ) & 0xff] ^
+ rk[7];
+
+ rk += 8;
+ if (--r == 0) {
+ break;
+ }
+
+ s0 =
+ Te0[(t0 >> 24) ] ^
+ Te1[(t1 >> 16) & 0xff] ^
+ Te2[(t2 >> 8) & 0xff] ^
+ Te3[(t3 ) & 0xff] ^
+ rk[0];
+ s1 =
+ Te0[(t1 >> 24) ] ^
+ Te1[(t2 >> 16) & 0xff] ^
+ Te2[(t3 >> 8) & 0xff] ^
+ Te3[(t0 ) & 0xff] ^
+ rk[1];
+ s2 =
+ Te0[(t2 >> 24) ] ^
+ Te1[(t3 >> 16) & 0xff] ^
+ Te2[(t0 >> 8) & 0xff] ^
+ Te3[(t1 ) & 0xff] ^
+ rk[2];
+ s3 =
+ Te0[(t3 >> 24) ] ^
+ Te1[(t0 >> 16) & 0xff] ^
+ Te2[(t1 >> 8) & 0xff] ^
+ Te3[(t2 ) & 0xff] ^
+ rk[3];
+ }
+#endif /* ?FULL_UNROLL */
+ /*
+ * apply last round and
+ * map cipher state to byte array block:
+ */
+ s0 =
+ (Te4[(t0 >> 24) ] & 0xff000000) ^
+ (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^
+ (Te4[(t2 >> 8) & 0xff] & 0x0000ff00) ^
+ (Te4[(t3 ) & 0xff] & 0x000000ff) ^
+ rk[0];
+ PUTU32(ct , s0);
+ s1 =
+ (Te4[(t1 >> 24) ] & 0xff000000) ^
+ (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^
+ (Te4[(t3 >> 8) & 0xff] & 0x0000ff00) ^
+ (Te4[(t0 ) & 0xff] & 0x000000ff) ^
+ rk[1];
+ PUTU32(ct + 4, s1);
+ s2 =
+ (Te4[(t2 >> 24) ] & 0xff000000) ^
+ (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^
+ (Te4[(t0 >> 8) & 0xff] & 0x0000ff00) ^
+ (Te4[(t1 ) & 0xff] & 0x000000ff) ^
+ rk[2];
+ PUTU32(ct + 8, s2);
+ s3 =
+ (Te4[(t3 >> 24) ] & 0xff000000) ^
+ (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^
+ (Te4[(t1 >> 8) & 0xff] & 0x0000ff00) ^
+ (Te4[(t2 ) & 0xff] & 0x000000ff) ^
+ rk[3];
+ PUTU32(ct + 12, s3);
+}
+
+void rijndael_encrypt(
+ const rijndael_ctx *ctx,
+ const UCHAR *src,
+ UCHAR *dst)
+{
+
+ rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst);
+}
+/* */
+/******************************************************************************/
diff --git a/epan/crypt/airpdcap_rijndael.h b/epan/crypt/airpdcap_rijndael.h
new file mode 100644
index 0000000000..b113c84643
--- /dev/null
+++ b/epan/crypt/airpdcap_rijndael.h
@@ -0,0 +1,68 @@
+#ifndef _AIRPDCAP_RIJNDAEL
+#define _AIRPDCAP_RIJNDAEL
+
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_interop.h"
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Definitions */
+/* */
+/* Note: copied AirPDcap/rijndael/rijndael.h */
+#define RIJNDAEL_MAXKC (256/32)
+#define RIJNDAEL_MAXKB (256/8)
+#define RIJNDAEL_MAXNR 14
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Type definitions */
+/* */
+/* Note: copied AirPDcap/rijndael/rijndael.h */
+typedef struct s_rijndael_ctx {
+ INT decrypt;
+ INT Nr; /* key-length-dependent number of rounds */
+ UINT32 ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */
+ UINT32 dk[4 * (RIJNDAEL_MAXNR + 1)]; /* decrypt key schedule */
+} rijndael_ctx;
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* External function prototypes declarations */
+/* */
+void rijndael_encrypt(
+ const rijndael_ctx *ctx,
+ const UCHAR *src,
+ UCHAR *dst)
+ ;
+
+
+void rijndael_set_key(
+ rijndael_ctx *ctx,
+ const UCHAR *key,
+ INT bits)
+ ;
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* External function definition */
+/* */
+static __inline void xor_block(
+ UINT8 *b,
+ const UINT8 *a,
+ size_t len)
+{
+ INT i;
+ for (i = 0; i < (INT)len; i++)
+ b[i] ^= a[i];
+}
+/* */
+/******************************************************************************/
+
+#endif
diff --git a/epan/crypt/airpdcap_sha1.c b/epan/crypt/airpdcap_sha1.c
new file mode 100644
index 0000000000..b49fe0d0a8
--- /dev/null
+++ b/epan/crypt/airpdcap_sha1.c
@@ -0,0 +1,343 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_sha1.h"
+
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal definitions */
+/* */
+/* Definition used in HMAC-SHA1 algorithm */
+/* Note: copied from FreeBSD source code, RELENG 6, sys/opencrypto/cryptodev.h*/
+#define HMAC_IPAD_VAL 0x36
+#define HMAC_OPAD_VAL 0x5C
+
+/* HMAC values */
+#define SHA1_HMAC_BLOCK_LEN (64/8)
+#define SHA2_512_HMAC_BLOCK_LEN (128/8)
+
+/* Maximum HMAC block length */
+#define HMAC_MAX_BLOCK_LEN SHA2_512_HMAC_BLOCK_LEN
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Type definitions */
+/* */
+/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.h, 41 */
+typedef struct _SHA1_CONTEXT {
+ union {
+ UCHAR b8[20];
+ UINT b32[5];
+ } h;
+ union {
+ UCHAR b8[8];
+ ULONGLONG b64[1];
+ } c;
+ union {
+ UCHAR b8[64];
+ UINT b32[16];
+ } m;
+ size_t count;
+} SHA1_CONTEXT;
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal macros */
+/* */
+/* Shortcuts used in HMAC-SHA1 */
+/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c */
+#define H(n) (ctxt->h.b32[(n)])
+#define COUNT (ctxt->count)
+#define BCOUNT (ctxt->c.b64[0] / 8)
+#define W(n) (ctxt->m.b32[(n)])
+
+static UINT32 _K[] = { 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xca62c1d6 };
+#define K(t) _K[(t) / 20]
+
+#define F0(b, c, d) (((b) & (c)) | ((~(b)) & (d)))
+#define F1(b, c, d) (((b) ^ (c)) ^ (d))
+#define F2(b, c, d) (((b) & (c)) | ((b) & (d)) | ((c) & (d)))
+#define F3(b, c, d) (((b) ^ (c)) ^ (d))
+
+#define S(n, x) (((x) << (n)) | ((x) >> (32 - n)))
+
+#define PUTPAD(x) { \
+ ctxt->m.b8[(COUNT % 64)] = (x); \
+ COUNT++; \
+ COUNT %= 64; \
+ if (COUNT % 64 == 0) \
+ sha1_step(ctxt); \
+}
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Function prototypes used internally */
+/* */
+void sha1_init(
+ SHA1_CONTEXT *ctxt)
+ ;
+void sha1_result(
+ SHA1_CONTEXT *ctxt,
+ UCHAR *digest0)
+ ;
+void sha1_pad(
+ SHA1_CONTEXT *ctxt)
+ ;
+
+static void sha1_step(
+ SHA1_CONTEXT *ctxt)
+ ;
+
+/* */
+/******************************************************************************/
+
+/* TODO: check for little-endian, big-endian */
+
+/******************************************************************************/
+/* Function definitions */
+/* */
+/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 176 */
+void sha1_init(
+ SHA1_CONTEXT *ctxt)
+{
+ memset(ctxt, 0, sizeof(SHA1_CONTEXT));
+ H(0) = 0x67452301;
+ H(1) = 0xefcdab89;
+ H(2) = 0x98badcfe;
+ H(3) = 0x10325476;
+ H(4) = 0xc3d2e1f0;
+}
+
+/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 223 */
+void sha1_loop(
+ SHA1_CONTEXT *ctxt,
+ const UCHAR *input,
+ size_t len)
+{
+ size_t gaplen;
+ size_t gapstart;
+ size_t off;
+ size_t copysiz;
+ off = 0;
+
+ while (off < len) {
+ gapstart = COUNT % 64;
+ gaplen = 64 - gapstart;
+
+ copysiz = (gaplen < len - off) ? gaplen : len - off;
+ memcpy(&ctxt->m.b8[gapstart], input+off, copysiz);
+ COUNT += (UCHAR)copysiz;
+ COUNT %= 64;
+ ctxt->c.b64[0] += copysiz * 8;
+ if (COUNT % 64 == 0)
+ sha1_step(ctxt);
+ off += copysiz;
+ }
+}
+
+/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 91 */
+static void sha1_step(
+ SHA1_CONTEXT *ctxt)
+{
+ UINT32 a, b, c, d, e;
+ size_t t, s;
+ UINT32 tmp;
+
+ SHA1_CONTEXT tctxt;
+ memcpy(&tctxt.m.b8[0], &ctxt->m.b8[0], 64);
+ ctxt->m.b8[0] = tctxt.m.b8[3]; ctxt->m.b8[1] = tctxt.m.b8[2];
+ ctxt->m.b8[2] = tctxt.m.b8[1]; ctxt->m.b8[3] = tctxt.m.b8[0];
+ ctxt->m.b8[4] = tctxt.m.b8[7]; ctxt->m.b8[5] = tctxt.m.b8[6];
+ ctxt->m.b8[6] = tctxt.m.b8[5]; ctxt->m.b8[7] = tctxt.m.b8[4];
+ ctxt->m.b8[8] = tctxt.m.b8[11]; ctxt->m.b8[9] = tctxt.m.b8[10];
+ ctxt->m.b8[10] = tctxt.m.b8[9]; ctxt->m.b8[11] = tctxt.m.b8[8];
+ ctxt->m.b8[12] = tctxt.m.b8[15]; ctxt->m.b8[13] = tctxt.m.b8[14];
+ ctxt->m.b8[14] = tctxt.m.b8[13]; ctxt->m.b8[15] = tctxt.m.b8[12];
+ ctxt->m.b8[16] = tctxt.m.b8[19]; ctxt->m.b8[17] = tctxt.m.b8[18];
+ ctxt->m.b8[18] = tctxt.m.b8[17]; ctxt->m.b8[19] = tctxt.m.b8[16];
+ ctxt->m.b8[20] = tctxt.m.b8[23]; ctxt->m.b8[21] = tctxt.m.b8[22];
+ ctxt->m.b8[22] = tctxt.m.b8[21]; ctxt->m.b8[23] = tctxt.m.b8[20];
+ ctxt->m.b8[24] = tctxt.m.b8[27]; ctxt->m.b8[25] = tctxt.m.b8[26];
+ ctxt->m.b8[26] = tctxt.m.b8[25]; ctxt->m.b8[27] = tctxt.m.b8[24];
+ ctxt->m.b8[28] = tctxt.m.b8[31]; ctxt->m.b8[29] = tctxt.m.b8[30];
+ ctxt->m.b8[30] = tctxt.m.b8[29]; ctxt->m.b8[31] = tctxt.m.b8[28];
+ ctxt->m.b8[32] = tctxt.m.b8[35]; ctxt->m.b8[33] = tctxt.m.b8[34];
+ ctxt->m.b8[34] = tctxt.m.b8[33]; ctxt->m.b8[35] = tctxt.m.b8[32];
+ ctxt->m.b8[36] = tctxt.m.b8[39]; ctxt->m.b8[37] = tctxt.m.b8[38];
+ ctxt->m.b8[38] = tctxt.m.b8[37]; ctxt->m.b8[39] = tctxt.m.b8[36];
+ ctxt->m.b8[40] = tctxt.m.b8[43]; ctxt->m.b8[41] = tctxt.m.b8[42];
+ ctxt->m.b8[42] = tctxt.m.b8[41]; ctxt->m.b8[43] = tctxt.m.b8[40];
+ ctxt->m.b8[44] = tctxt.m.b8[47]; ctxt->m.b8[45] = tctxt.m.b8[46];
+ ctxt->m.b8[46] = tctxt.m.b8[45]; ctxt->m.b8[47] = tctxt.m.b8[44];
+ ctxt->m.b8[48] = tctxt.m.b8[51]; ctxt->m.b8[49] = tctxt.m.b8[50];
+ ctxt->m.b8[50] = tctxt.m.b8[49]; ctxt->m.b8[51] = tctxt.m.b8[48];
+ ctxt->m.b8[52] = tctxt.m.b8[55]; ctxt->m.b8[53] = tctxt.m.b8[54];
+ ctxt->m.b8[54] = tctxt.m.b8[53]; ctxt->m.b8[55] = tctxt.m.b8[52];
+ ctxt->m.b8[56] = tctxt.m.b8[59]; ctxt->m.b8[57] = tctxt.m.b8[58];
+ ctxt->m.b8[58] = tctxt.m.b8[57]; ctxt->m.b8[59] = tctxt.m.b8[56];
+ ctxt->m.b8[60] = tctxt.m.b8[63]; ctxt->m.b8[61] = tctxt.m.b8[62];
+ ctxt->m.b8[62] = tctxt.m.b8[61]; ctxt->m.b8[63] = tctxt.m.b8[60];
+
+ a = H(0); b = H(1); c = H(2); d = H(3); e = H(4);
+
+ for (t = 0; t < 20; t++) {
+ s = t & 0x0f;
+ if (t >= 16) {
+ W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s));
+ }
+ tmp = S(5, a) + F0(b, c, d) + e + W(s) + K(t);
+ e = d; d = c; c = S(30, b); b = a; a = tmp;
+ }
+ for (t = 20; t < 40; t++) {
+ s = t & 0x0f;
+ W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s));
+ tmp = S(5, a) + F1(b, c, d) + e + W(s) + K(t);
+ e = d; d = c; c = S(30, b); b = a; a = tmp;
+ }
+ for (t = 40; t < 60; t++) {
+ s = t & 0x0f;
+ W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s));
+ tmp = S(5, a) + F2(b, c, d) + e + W(s) + K(t);
+ e = d; d = c; c = S(30, b); b = a; a = tmp;
+ }
+ for (t = 60; t < 80; t++) {
+ s = t & 0x0f;
+ W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s));
+ tmp = S(5, a) + F3(b, c, d) + e + W(s) + K(t);
+ e = d; d = c; c = S(30, b); b = a; a = tmp;
+ }
+
+ H(0) = H(0) + a;
+ H(1) = H(1) + b;
+ H(2) = H(2) + c;
+ H(3) = H(3) + d;
+ H(4) = H(4) + e;
+
+ memset(&ctxt->m.b8[0], 0, 64);
+}
+
+/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 188 */
+void sha1_pad(
+ SHA1_CONTEXT *ctxt)
+{
+ size_t padlen; /*pad length in bytes*/
+ size_t padstart;
+
+ PUTPAD(0x80);
+
+ padstart = COUNT % 64;
+ padlen = 64 - padstart;
+ if (padlen < 8) {
+ memset(&ctxt->m.b8[padstart], 0, padlen);
+ COUNT += padlen;
+ COUNT %= 64;
+ sha1_step(ctxt);
+ padstart = COUNT % 64; /* should be 0 */
+ padlen = 64 - padstart; /* should be 64 */
+ }
+ memset(&ctxt->m.b8[padstart], 0, padlen - 8);
+ COUNT += (padlen - 8);
+ COUNT %= 64;
+
+ PUTPAD(ctxt->c.b8[7]); PUTPAD(ctxt->c.b8[6]);
+ PUTPAD(ctxt->c.b8[5]); PUTPAD(ctxt->c.b8[4]);
+ PUTPAD(ctxt->c.b8[3]); PUTPAD(ctxt->c.b8[2]);
+ PUTPAD(ctxt->c.b8[1]); PUTPAD(ctxt->c.b8[0]);
+}
+
+/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 251 */
+void sha1_result(
+ SHA1_CONTEXT *ctxt,
+ UCHAR *digest0)
+{
+ UINT8 *digest;
+
+ digest = (UINT8 *)digest0;
+ sha1_pad(ctxt);
+
+ digest[0] = ctxt->h.b8[3]; digest[1] = ctxt->h.b8[2];
+ digest[2] = ctxt->h.b8[1]; digest[3] = ctxt->h.b8[0];
+ digest[4] = ctxt->h.b8[7]; digest[5] = ctxt->h.b8[6];
+ digest[6] = ctxt->h.b8[5]; digest[7] = ctxt->h.b8[4];
+ digest[8] = ctxt->h.b8[11]; digest[9] = ctxt->h.b8[10];
+ digest[10] = ctxt->h.b8[9]; digest[11] = ctxt->h.b8[8];
+ digest[12] = ctxt->h.b8[15]; digest[13] = ctxt->h.b8[14];
+ digest[14] = ctxt->h.b8[13]; digest[15] = ctxt->h.b8[12];
+ digest[16] = ctxt->h.b8[19]; digest[17] = ctxt->h.b8[18];
+ digest[18] = ctxt->h.b8[17]; digest[19] = ctxt->h.b8[16];
+}
+
+void AirPDcapAlgHmacSha1(
+ const UCHAR *key_len,
+ const size_t keylen,
+ UCHAR *buffer,
+ const size_t digest_len,
+ UCHAR digest[20])
+{
+ //INT i;
+ //SHA1_CONTEXT ictx;
+ //SHA1_CONTEXT octx;
+ //UCHAR tmpkey[64];
+ //UCHAR tmp[HMAC_MAX_BLOCK_LEN];
+
+ //memset(tmpkey, 0, sizeof(tmpkey));
+ //memset(tmp, 0, sizeof(tmp));
+
+ //memcpy(tmpkey, key_len, keylen);
+
+ //for(i = 0; i<keylen; i++)
+ // tmpkey[i] ^= HMAC_IPAD_VAL;
+
+ //sha1_init(&ictx);
+ //sha1_loop(&ictx, tmpkey, keylen);
+ //sha1_loop(&ictx, tmp, HMAC_MAX_BLOCK_LEN-keylen);
+
+ //for(i = 0; i<keylen; i++)
+ // tmpkey[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL);
+
+ //sha1_init(&octx);
+ //sha1_loop(&octx, tmpkey, keylen);
+ //sha1_loop(&octx, tmp, HMAC_MAX_BLOCK_LEN-keylen);
+
+ //for(i = 0; i<keylen; i++)
+ // tmpkey[i] ^= HMAC_OPAD_VAL;
+
+ //sha1_loop(&ictx, buffer, digest_len);
+ //sha1_result(&ictx, digest);
+ //sha1_loop(&octx, digest, 20);
+ //sha1_result(&octx, digest);
+
+ INT i;
+ SHA1_CONTEXT ictx, octx;
+ UCHAR tmpkey[64];
+ UCHAR tmp[20];
+
+ memset(tmpkey, 0, sizeof(tmpkey));
+ memcpy(tmpkey, key_len, keylen);
+
+ for(i = 0; i<64; i++)
+ tmpkey[i] ^= HMAC_IPAD_VAL;
+
+ sha1_init(&ictx);
+ sha1_loop(&ictx, tmpkey, 64);
+
+ for(i = 0; i<64; i++)
+ tmpkey[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL);
+
+ sha1_init(&octx);
+ sha1_loop(&octx, tmpkey, 64);
+
+ sha1_loop(&ictx, buffer, digest_len);
+ sha1_result(&ictx, tmp);
+ sha1_loop(&octx, tmp, 20);
+ sha1_result(&octx, digest);
+
+}
+/* */
+/******************************************************************************/
diff --git a/epan/crypt/airpdcap_sha1.h b/epan/crypt/airpdcap_sha1.h
new file mode 100644
index 0000000000..87ebfb643d
--- /dev/null
+++ b/epan/crypt/airpdcap_sha1.h
@@ -0,0 +1,28 @@
+#ifndef _AIRPDCAP_SHA1
+#define _AIRPDCAP_SHA1
+
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_interop.h"
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Definitions */
+/* */
+/* Maximum HMAC block length */
+#define HMAC_MAX_BLOCK_LEN SHA2_512_HMAC_BLOCK_LEN
+#define HMAC_IPAD_VAL 0x36
+#define HMAC_OPAD_VAL 0x5C
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* External function prototypes declarations */
+/* */
+/* */
+/******************************************************************************/
+
+#endif
diff --git a/epan/crypt/airpdcap_system.h b/epan/crypt/airpdcap_system.h
new file mode 100644
index 0000000000..4c8d42bc59
--- /dev/null
+++ b/epan/crypt/airpdcap_system.h
@@ -0,0 +1,350 @@
+#ifndef _AIRPDCAP_SYSTEM_H
+#define _AIRPDCAP_SYSTEM_H
+
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_interop.h"
+#include "airpdcap_user.h"
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Constant definitions */
+/* */
+/* General definitions */
+#ifndef TRUE
+#define TRUE 1
+#endif
+#ifndef FALSE
+#define FALSE 0
+#endif
+
+#define AIRPDCAP_RET_SUCCESS 0
+#define AIRPDCAP_RET_UNSUCCESS 1
+
+#define AIRPDCAP_RET_NO_DATA 1
+#define AIRPDCAP_RET_WRONG_DATA_SIZE 2
+#define AIRPDCAP_RET_REQ_DATA 3
+#define AIRPDCAP_RET_NO_VALID_HANDSHAKE 4
+#define AIRPDCAP_RET_NO_DATA_ENCRYPTED 5
+
+#define AIRPDCAP_RET_SUCCESS_HANDSHAKE -1
+
+#define AIRPDCAP_MAX_KEYS_NR 64
+#define AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR 256
+
+/* Decryption algorithms fields size definition (bytes) */
+#define AIRPDCAP_WPA_NONCE_LEN 32
+#define AIRPDCAP_WPA_PTK_LEN 64 /* TKIP uses 48 bytes, CCMP uses 64 bytes */
+#define AIRPDCAP_WPA_MICKEY_LEN 16
+
+#define AIRPDCAP_WEP_128_KEY_LEN 16 /* 128 bits */
+
+/* General 802.11 constants */
+#define AIRPDCAP_MAC_LEN 6
+#define AIRPDCAP_RADIOTAP_HEADER_LEN 24
+
+#define AIRPDCAP_EAPOL_MAX_LEN 1024
+
+#define AIRPDCAP_TK_LEN 16
+
+/* Max length of capture data */
+#define AIRPDCAP_MAX_CAPLEN 8192
+
+#define AIRPDCAP_WEP_IVLEN 3 /* 24bit */
+#define AIRPDCAP_WEP_KIDLEN 1 /* 1 octet */
+#define AIRPDCAP_WEP_ICV 4
+#define AIRPDCAP_WEP_HEADER AIRPDCAP_WEP_IVLEN + AIRPDCAP_WEP_KIDLEN
+#define AIRPDCAP_WEP_TRAILER AIRPDCAP_WEP_ICV
+
+/*
+* 802.11i defines an extended IV for use with non-WEP ciphers.
+* When the EXTIV bit is set in the key id byte an additional
+* 4 bytes immediately follow the IV for TKIP. For CCMP the
+* EXTIV bit is likewise set but the 8 bytes represent the
+* CCMP header rather than IV+extended-IV.
+*/
+#define AIRPDCAP_RSNA_EXTIV 0x20
+#define AIRPDCAP_RSNA_EXTIVLEN 4 /* extended IV length */
+#define AIRPDCAP_RSNA_MICLEN 8 /* trailing MIC */
+
+#define AIRPDCAP_RSNA_HEADER AIRPDCAP_WEP_HEADER + AIRPDCAP_RSNA_EXTIVLEN
+
+#define AIRPDCAP_CCMP_HEADER AIRPDCAP_RSNA_HEADER
+#define AIRPDCAP_CCMP_TRAILER AIRPDCAP_RSNA_MICLEN
+
+#define AIRPDCAP_TKIP_HEADER AIRPDCAP_RSNA_HEADER
+#define AIRPDCAP_TKIP_TRAILER AIRPDCAP_RSNA_MICLEN + AIRPDCAP_WEP_ICV
+
+#define AIRPDCAP_CRC_LEN 4
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Macro definitions */
+/* */
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Type definitions */
+/* */
+typedef struct _AIRPDCAP_SEC_ASSOCIATION_ID {
+ UCHAR bssid[AIRPDCAP_MAC_LEN];
+ UCHAR sta[AIRPDCAP_MAC_LEN];
+} AIRPDCAP_SEC_ASSOCIATION_ID, *PAIRPDCAP_SEC_ASSOCIATION_ID;
+
+typedef struct _AIRPDCAP_SEC_ASSOCIATION {
+ /*!
+ This flag define whether this item is used or not. Accepted values are TRUE and FALSE
+ */
+ UINT8 used;
+ AIRPDCAP_SEC_ASSOCIATION_ID saId;
+ AIRPDCAP_KEY_ITEM *key;
+ UINT8 handshake;
+ UINT8 validKey;
+
+ struct {
+ UINT8 key_ver; /* Key descriptor version */
+ UINT64 pn; /* only used with CCMP AES -if needed replay check- */
+ UCHAR nonce[AIRPDCAP_WPA_NONCE_LEN];
+ /* used to derive PTK, ANonce stored, SNonce taken */
+ /* the 2nd packet of the 4W handshake */
+
+ UCHAR ptk[AIRPDCAP_WPA_PTK_LEN]; /* session key used in decryption algorithm */
+ } wpa;
+} AIRPDCAP_SEC_ASSOCIATION, *PAIRPDCAP_SEC_ASSOCIATION;
+
+typedef struct _AIRPDCAP_CONTEXT {
+ AIRPDCAP_SEC_ASSOCIATION sa[AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR];
+ size_t sa_nr;
+ AIRPDCAP_KEY_ITEM keys[AIRPDCAP_MAX_KEYS_NR];
+ size_t keys_nr;
+
+ INT index;
+ INT first_free_index;
+ INT last_stored_index;
+} AIRPDCAP_CONTEXT, *PAIRPDCAP_CONTEXT;
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Function prototype declarations */
+/* */
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+/**
+ * It processes a packet and if necessary it tries to decrypt
+ * encrypted data.
+ * The packet received in input should be an 802.11 frame (composed by the
+ * MAC header, the frame body and the FCS -if specified-). If the data will
+ * be decrypted the FCS will be recomputed. The packet received could start
+ * with a RadioTap header.
+ * @param ctx [IN] pointer to the current context
+ * @param data [IN] pointer to a buffer with packet data
+ * @param len [IN] packet data length; this should be the capture packet
+ * length (to avoid errors in processing)
+ * @param decrypt_data [OUT] pointer to a buffer that will contain
+ * decrypted data
+ * @param decrypt_len [OUT] length of decrypted data
+ * @param key [OUT] pointer to a preallocated key structure containing
+ * the key used during the decryption process (if done). If this parameter
+ * is set to NULL, the key will be not returned.
+ * @param fcsPresent [IN] flag that specifies if the FCS is present in
+ * the packet or not (0 when the FCS is not present, 1 when it is).
+ * @param radioTapPresent [IN] flag that specifies if a RadioTap header
+ * is present or not (0 when the header is no present, 1 when it is).
+ * @param mngHandshake [IN] if TRUE this function will manage the 4-way
+ * handshake for WPA/WPA2
+ * @param mngDecrypt [IN] if TRUE this function will manage the WEP or
+ * WPA/WPA2 decryption
+ * @return
+ * - AIRPDCAP_RET_SUCCESS: decryption has been done (decrypt_data and
+ * decrypt_length will contain the packet data decrypted and the lenght of
+ * the new packet)
+ * - AIRPDCAP_RET_SUCCESS_HANDSHAKE: a step of the 4-way handshake for
+ * WPA key has been successfully done
+ * - AIRPDCAP_RET_NO_DATA: the packet is not a data packet
+ * - AIRPDCAP_RET_WRONG_DATA_SIZE: the size of the packet is below the
+ * accepted minimum
+ * - AIRPDCAP_RET_REQ_DATA: required data is not available and the
+ * processing must be interrupted
+ * - AIRPDCAP_RET_NO_VALID_HANDSHAKE: the authentication is not for WPA or RSNA
+ * - AIRPDCAP_RET_NO_DATA_ENCRYPTED: no encrypted data
+ * - AIRPDCAP_RET_UNSUCCESS: no decryption has been done (decrypt_data
+ * and decrypt_length will be not modified).
+ * Some other errors could be:
+ * data not correct
+ * data not encrypted
+ * key handshake, not encryption
+ * decryption not successful
+ * key handshake not correct
+ * replay check not successful
+ * @note
+ * The decrypted buffer should be allocated for a size equal or greater
+ * than the packet data buffer size. Before decryption process original
+ * data is copied in the buffer pointed by decrypt_data not to modify the
+ * original packet.
+ * @note
+ * The length of decrypted data will consider the entire 802.11 frame
+ * (thus the MAC header, the frame body and the recalculated FCS -if
+ * initially present-)
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions on the same context.
+ */
+extern INT AirPDcapPacketProcess(
+ PAIRPDCAP_CONTEXT ctx,
+ const UCHAR *data,
+ const size_t len,
+ UCHAR *decrypt_data,
+ size_t *decrypt_len,
+ PAIRPDCAP_KEY_ITEM key,
+ UINT8 fcsPresent,
+ UINT8 radioTapPresent,
+ UINT8 mngHandshake,
+ UINT8 mngDecrypt)
+ ;
+
+/**
+ * It sets a new keys collection to use during packet processing.
+ * Any key should be well-formed, thus: it should have a defined key
+ * type and the specified length should be conforming WEP or WPA/WPA2
+ * standards. A general WEP keys could be of any length (in the range
+ * defined in AIRPDCAP_KEY_ITEM), if a specific WEP key is used, the
+ * length of the key will be the one specified in 802.11i-2004 (40 bits or
+ * 104 bits).
+ * For WPA/WPA2 the password (passphrase and SSID), the PSK and the PMK
+ * are in alternative, as explain in the AIRPDCAP_KEY_ITEM structure
+ * description.
+ * @param ctx [IN] pointer to the current context
+ * @param keys [IN] an array of keys to set.
+ * @param keys_nr [IN] the size of the keys array
+ * @return The number of keys correctly inserted in the current database.
+ * @note Before inserting new keys, the current database will be cleaned.
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same
+ * context.
+ */
+extern INT AirPDcapSetKeys(
+ PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_KEY_ITEM keys[],
+ const size_t keys_nr)
+ ;
+
+/**
+ * Remove all keys from the active database
+ * @param ctx [IN] pointer to the current context
+ * @return The number of keys correctly removed.
+ *
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same
+ * context.
+ */
+INT AirPDcapCleanKeys(
+ PAIRPDCAP_CONTEXT ctx)
+ ;
+
+/**
+ * It gets the keys collection fom the specified context.
+ * @param ctx [IN] pointer to the current context
+ * @param key [IN] a preallocated array of keys to be returned
+ * @param keys_nr [IN] the number of keys to return (the key array must
+ * be able to contain at least keys_nr keys)
+ * @return The number of keys returned
+ * @note
+ * Any key could be modified, as stated in the AIRPDCAP_KEY_ITEM description.
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same
+ * context.
+ */
+INT AirPDcapGetKeys(
+ const PAIRPDCAP_CONTEXT ctx,
+ AIRPDCAP_KEY_ITEM keys[],
+ const size_t keys_nr)
+ ;
+/**
+ * Initialize a context used to manage decryption and keys collection.
+ * @param ctx [IN|OUT] pointer to a preallocated context structure
+ * @return
+ * AIRPDCAP_RET_SUCCESS: the context has been successfully initialized
+ * AIRPDCAP_RET_UNSUCCESS: the context has not been initialized
+ * @note
+ * Only a correctly initialized context can be used to manage decryption
+ * processes and keys.
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same context.
+ */
+INT AirPDcapInitContext(
+ PAIRPDCAP_CONTEXT ctx)
+ ;
+
+/**
+ * Clean up the specified context. After the cleanup the pointer should
+ * not be used anymore.
+ * @param ctx [IN|OUT] pointer to the current context structure
+ * @return
+ * AIRPDCAP_RET_SUCCESS: the context has been successfully initialized
+ * AIRPDCAP_RET_UNSUCCESS: the context has not been initialized
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same
+ * context.
+ */
+INT AirPDcapDestroyContext(
+ PAIRPDCAP_CONTEXT ctx)
+ ;
+
+
+extern INT AirPDcapWepDecrypt(
+ const UCHAR *seed,
+ const size_t seed_len, /* max AIRPDCAP_KEYBUF_SIZE */
+ UCHAR *cypher_text,
+ const size_t data_len)
+ ;
+extern INT AirPDcapCcmpDecrypt(
+ UINT8 *m,
+ INT len,
+ UCHAR TK1[16])
+ ;
+extern INT AirPDcapTkipDecrypt(
+ UCHAR *tkip_mpdu,
+ size_t mpdu_len,
+ UCHAR TA[AIRPDCAP_MAC_LEN],
+ UCHAR TK[AIRPDCAP_TK_LEN])
+ ;
+extern void AirPDcapAlgHmacMd5(
+ UCHAR *key, /* pointer to authentication key */
+ INT key_len, /* length of authentication key */
+ const UCHAR *text, /* pointer to data stream */
+ const INT text_len, /* length of data stream */
+ UCHAR *digest) /* caller digest to be filled in */
+ ;
+extern void AirPDcapAlgHmacSha1(
+ const UCHAR *key_len,
+ const size_t keylen,
+ UCHAR *buffer,
+ const size_t digest_len,
+ UCHAR digest[20])
+ ;
+
+
+#ifdef __cplusplus
+}
+#endif
+/* */
+/* */
+/******************************************************************************/
+
+#endif /* _AIRPDCAP_SYSTEM_H */
diff --git a/epan/crypt/airpdcap_tkip.c b/epan/crypt/airpdcap_tkip.c
new file mode 100644
index 0000000000..886540e6c9
--- /dev/null
+++ b/epan/crypt/airpdcap_tkip.c
@@ -0,0 +1,250 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_system.h"
+#include "airpdcap_int.h"
+
+#include "airpdcap_wep.h"
+
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal definitions */
+/* */
+#define PHASE1_LOOP_COUNT 8
+
+#define AIRPDCAP_TTAK_LEN 6
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Internal function prototypes declarations */
+/* */
+void AirPDcapTkipMixingPhase1(
+ UINT16 *TTAK,
+ const UINT8 *TK,
+ const UINT8 *TA,
+ UINT32 TSC)
+ ;
+
+static void AirPDcapTkipMixingPhase2(
+ UINT8 *wep_seed,
+ const UINT8 *TK,
+ UINT16 *PPK,
+ UINT16 TSC16)
+ ;
+
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Global variables */
+/* */
+/* Note: copied from FreeBSD source code, RELENG 6, */
+/* sys/net80211/ieee80211_crypto_tkip.c, 471 */
+static const UINT16 Sbox[256] = {
+ 0xC6A5, 0xF884, 0xEE99, 0xF68D, 0xFF0D, 0xD6BD, 0xDEB1, 0x9154,
+ 0x6050, 0x0203, 0xCEA9, 0x567D, 0xE719, 0xB562, 0x4DE6, 0xEC9A,
+ 0x8F45, 0x1F9D, 0x8940, 0xFA87, 0xEF15, 0xB2EB, 0x8EC9, 0xFB0B,
+ 0x41EC, 0xB367, 0x5FFD, 0x45EA, 0x23BF, 0x53F7, 0xE496, 0x9B5B,
+ 0x75C2, 0xE11C, 0x3DAE, 0x4C6A, 0x6C5A, 0x7E41, 0xF502, 0x834F,
+ 0x685C, 0x51F4, 0xD134, 0xF908, 0xE293, 0xAB73, 0x6253, 0x2A3F,
+ 0x080C, 0x9552, 0x4665, 0x9D5E, 0x3028, 0x37A1, 0x0A0F, 0x2FB5,
+ 0x0E09, 0x2436, 0x1B9B, 0xDF3D, 0xCD26, 0x4E69, 0x7FCD, 0xEA9F,
+ 0x121B, 0x1D9E, 0x5874, 0x342E, 0x362D, 0xDCB2, 0xB4EE, 0x5BFB,
+ 0xA4F6, 0x764D, 0xB761, 0x7DCE, 0x527B, 0xDD3E, 0x5E71, 0x1397,
+ 0xA6F5, 0xB968, 0x0000, 0xC12C, 0x4060, 0xE31F, 0x79C8, 0xB6ED,
+ 0xD4BE, 0x8D46, 0x67D9, 0x724B, 0x94DE, 0x98D4, 0xB0E8, 0x854A,
+ 0xBB6B, 0xC52A, 0x4FE5, 0xED16, 0x86C5, 0x9AD7, 0x6655, 0x1194,
+ 0x8ACF, 0xE910, 0x0406, 0xFE81, 0xA0F0, 0x7844, 0x25BA, 0x4BE3,
+ 0xA2F3, 0x5DFE, 0x80C0, 0x058A, 0x3FAD, 0x21BC, 0x7048, 0xF104,
+ 0x63DF, 0x77C1, 0xAF75, 0x4263, 0x2030, 0xE51A, 0xFD0E, 0xBF6D,
+ 0x814C, 0x1814, 0x2635, 0xC32F, 0xBEE1, 0x35A2, 0x88CC, 0x2E39,
+ 0x9357, 0x55F2, 0xFC82, 0x7A47, 0xC8AC, 0xBAE7, 0x322B, 0xE695,
+ 0xC0A0, 0x1998, 0x9ED1, 0xA37F, 0x4466, 0x547E, 0x3BAB, 0x0B83,
+ 0x8CCA, 0xC729, 0x6BD3, 0x283C, 0xA779, 0xBCE2, 0x161D, 0xAD76,
+ 0xDB3B, 0x6456, 0x744E, 0x141E, 0x92DB, 0x0C0A, 0x486C, 0xB8E4,
+ 0x9F5D, 0xBD6E, 0x43EF, 0xC4A6, 0x39A8, 0x31A4, 0xD337, 0xF28B,
+ 0xD532, 0x8B43, 0x6E59, 0xDAB7, 0x018C, 0xB164, 0x9CD2, 0x49E0,
+ 0xD8B4, 0xACFA, 0xF307, 0xCF25, 0xCAAF, 0xF48E, 0x47E9, 0x1018,
+ 0x6FD5, 0xF088, 0x4A6F, 0x5C72, 0x3824, 0x57F1, 0x73C7, 0x9751,
+ 0xCB23, 0xA17C, 0xE89C, 0x3E21, 0x96DD, 0x61DC, 0x0D86, 0x0F85,
+ 0xE090, 0x7C42, 0x71C4, 0xCCAA, 0x90D8, 0x0605, 0xF701, 0x1C12,
+ 0xC2A3, 0x6A5F, 0xAEF9, 0x69D0, 0x1791, 0x9958, 0x3A27, 0x27B9,
+ 0xD938, 0xEB13, 0x2BB3, 0x2233, 0xD2BB, 0xA970, 0x0789, 0x33A7,
+ 0x2DB6, 0x3C22, 0x1592, 0xC920, 0x8749, 0xAAFF, 0x5078, 0xA57A,
+ 0x038F, 0x59F8, 0x0980, 0x1A17, 0x65DA, 0xD731, 0x84C6, 0xD0B8,
+ 0x82C3, 0x29B0, 0x5A77, 0x1E11, 0x7BCB, 0xA8FC, 0x6DD6, 0x2C3A,
+};
+/* */
+/******************************************************************************/
+
+/* TODO: check for little-endian, big-endian */
+
+/******************************************************************************/
+/* Function definitions */
+/* */
+/* Note: any functions were copied from FreeBSD source code, RELENG 6, */
+/* sys/net80211/ieee80211_crypto_tkip.c */
+static __inline UINT16 RotR1(
+ UINT16 val)
+{
+ return (UINT16)((val >> 1) | (val << 15));
+}
+
+static __inline UINT8 Lo8(
+ UINT16 val)
+{
+ return (UINT8)(val & 0xff);
+}
+
+static __inline UINT8 Hi8(
+ UINT16 val)
+{
+ return (UINT8)(val >> 8);
+}
+
+static __inline UINT16 Lo16(
+ UINT32 val)
+{
+ return (UINT16)(val & 0xffff);
+}
+
+static __inline UINT16 Hi16(
+ UINT32 val)
+{
+ return (UINT16)(val >> 16);
+}
+
+static __inline UINT16 Mk16(
+ UINT8 hi,
+ UINT8 lo)
+{
+ return (UINT16)(lo | (((UINT16) hi) << 8));
+}
+
+static __inline UINT16 Mk16_le(const UINT16 *v)
+{
+ return (UINT16)*v;
+}
+
+static __inline UINT16 _S_(
+ UINT16 v)
+{
+ UINT16 t = Sbox[Hi8(v)];
+ return (UINT16)(Sbox[Lo8(v)] ^ ((t << 8) | (t >> 8)));
+}
+
+static __inline UINT64 READ_6(
+ UINT8 b0,
+ UINT8 b1,
+ UINT8 b2,
+ UINT8 b3,
+ UINT8 b4,
+ UINT8 b5)
+{
+ UINT32 iv32 = (b0 << 0) | (b1 << 8) | (b2 << 16) | (b3 << 24);
+ UINT16 iv16 = (UINT16)((b4 << 0) | (b5 << 8));
+ return (((UINT64)iv16) << 32) | iv32;
+}
+
+void AirPDcapTkipMixingPhase1(
+ UINT16 *TTAK,
+ const UINT8 *TK,
+ const UINT8 *TA,
+ UINT32 TSC)
+{
+ UINT16 i, j;
+
+ /* Initialize the 80-bit TTAK from TSC (TSC) and TA[0..5] */
+ TTAK[0] = Lo16(TSC);
+ TTAK[1] = Hi16(TSC);
+ TTAK[2] = Mk16(TA[1], TA[0]);
+ TTAK[3] = Mk16(TA[3], TA[2]);
+ TTAK[4] = Mk16(TA[5], TA[4]);
+
+ for (i = 0; i < PHASE1_LOOP_COUNT; i++) {
+ j = (UINT16)(2 * (i & 1));
+ TTAK[0] = (UINT16)(TTAK[0] + _S_((UINT16)(TTAK[4] ^ Mk16(TK[1 + j], TK[0 + j]))));
+ TTAK[1] = (UINT16)(TTAK[1] + _S_((UINT16)(TTAK[0] ^ Mk16(TK[5 + j], TK[4 + j]))));
+ TTAK[2] = (UINT16)(TTAK[2] + _S_((UINT16)(TTAK[1] ^ Mk16(TK[9 + j], TK[8 + j]))));
+ TTAK[3] = (UINT16)(TTAK[3] + _S_((UINT16)(TTAK[2] ^ Mk16(TK[13 + j], TK[12 + j]))));
+ TTAK[4] = (UINT16)(TTAK[4] + _S_((UINT16)(TTAK[3] ^ Mk16(TK[1 + j], TK[0 + j]))) + i);
+ }
+}
+
+static void AirPDcapTkipMixingPhase2(
+ UINT8 *wep_seed,
+ const UINT8 *TK,
+ UINT16 *TTAK,
+ UINT16 TSC16)
+{
+ INT i;
+ TTAK[5] = (UINT16)(TTAK[4] + TSC16);
+
+ /* Step 2 - 96-bit bijective mixing using S-box */
+ TTAK[0] = (UINT16)(TTAK[0] + _S_((UINT16)(TTAK[5] ^ Mk16_le((const UINT16 *) &TK[0]))));
+ TTAK[1] = (UINT16)(TTAK[1] + _S_((UINT16)(TTAK[0] ^ Mk16_le((const UINT16 *) &TK[2]))));
+ TTAK[2] = (UINT16)(TTAK[2] + _S_((UINT16)(TTAK[1] ^ Mk16_le((const UINT16 *) &TK[4]))));
+ TTAK[3] = (UINT16)(TTAK[3] + _S_((UINT16)(TTAK[2] ^ Mk16_le((const UINT16 *) &TK[6]))));
+ TTAK[4] = (UINT16)(TTAK[4] + _S_((UINT16)(TTAK[3] ^ Mk16_le((const UINT16 *) &TK[8]))));
+ TTAK[5] = (UINT16)(TTAK[5] + _S_((UINT16)(TTAK[4] ^ Mk16_le((const UINT16 *) &TK[10]))));
+
+ TTAK[0] = (UINT16)(TTAK[0] + RotR1((UINT16)(TTAK[5] ^ Mk16_le((const UINT16 *) &TK[12]))));
+ TTAK[1] = (UINT16)(TTAK[1] + RotR1((UINT16)(TTAK[0] ^ Mk16_le((const UINT16 *) &TK[14]))));
+ TTAK[2] = (UINT16)(TTAK[2] + RotR1(TTAK[1]));
+ TTAK[3] = (UINT16)(TTAK[3] + RotR1(TTAK[2]));
+ TTAK[4] = (UINT16)(TTAK[4] + RotR1(TTAK[3]));
+ TTAK[5] = (UINT16)(TTAK[5] + RotR1(TTAK[4]));
+
+ /* Step 3 - bring in last of TK bits, assign 24-bit WEP IV value
+ * wep_seed[0..2] is transmitted as WEP IV */
+ wep_seed[0] = Hi8(TSC16);
+ wep_seed[1] = (UINT8)((Hi8(TSC16) | 0x20) & 0x7F);
+ wep_seed[2] = Lo8(TSC16);
+ wep_seed[3] = Lo8((UINT16)((TTAK[5] ^ Mk16_le((const UINT16 *) &TK[0])) >> 1));
+
+ for (i = 0; i < 6; i++)
+ {
+ wep_seed[4 + ( 2 * i)] = Lo8( TTAK[i] );
+ wep_seed[5 + ( 2 * i)] = Hi8( TTAK[i] );
+ }
+}
+
+/* Note: taken from FreeBSD source code, RELENG 6, */
+/* sys/net80211/ieee80211_crypto_tkip.c, 936 */
+INT AirPDcapTkipDecrypt(
+ UCHAR *tkip_mpdu,
+ size_t mpdu_len,
+ UCHAR TA[AIRPDCAP_MAC_LEN],
+ UCHAR TK[AIRPDCAP_TK_LEN])
+{
+ UINT32 TSC;
+ UINT16 TSC16;
+ UINT8 *IV;
+ UINT16 TTAK[AIRPDCAP_TTAK_LEN];
+ UINT8 wep_seed[AIRPDCAP_WEP_128_KEY_LEN];
+
+ IV = tkip_mpdu;
+
+ TSC16 = (UINT16)READ_6(IV[2], IV[0], IV[4], IV[5], IV[6], IV[7]);
+
+ TSC = (UINT32)TSC16 >> 16;
+
+ AirPDcapTkipMixingPhase1(TTAK, TK, TA, TSC);
+
+ AirPDcapTkipMixingPhase2(wep_seed, TK, TTAK, TSC16);
+
+ return AirPDcapWepDecrypt(
+ wep_seed,
+ AIRPDCAP_WEP_128_KEY_LEN,
+ tkip_mpdu + AIRPDCAP_TKIP_HEADER,
+ mpdu_len-(AIRPDCAP_TKIP_HEADER+AIRPDCAP_WEP_ICV)); /* MPDU - TKIP_HEADER - MIC */
+
+ /* TODO check (IEEE 802.11i-2004, pg. 44) */
+
+}
+/* */
+/******************************************************************************/
diff --git a/epan/crypt/airpdcap_tkip.h b/epan/crypt/airpdcap_tkip.h
new file mode 100644
index 0000000000..e69de29bb2
--- /dev/null
+++ b/epan/crypt/airpdcap_tkip.h
diff --git a/epan/crypt/airpdcap_user.h b/epan/crypt/airpdcap_user.h
new file mode 100644
index 0000000000..b637ea90b8
--- /dev/null
+++ b/epan/crypt/airpdcap_user.h
@@ -0,0 +1,167 @@
+#ifndef _AIRPDCAP_USER_H
+#define _AIRPDCAP_USER_H
+
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_interop.h"
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Constant definitions */
+/* */
+/* Decryption key types */
+#define AIRPDCAP_KEY_TYPE_WEP 0
+#define AIRPDCAP_KEY_TYPE_WEP_40 1
+#define AIRPDCAP_KEY_TYPE_WEP_104 2
+#define AIRPDCAP_KEY_TYPE_WPA_PWD 3
+#define AIRPDCAP_KEY_TYPE_WPA_PSK 4
+#define AIRPDCAP_KEY_TYPE_WPA_PMK 5
+#define AIRPDCAP_KEY_TYPE_TKIP 6
+#define AIRPDCAP_KEY_TYPE_CCMP 7
+
+/* Decryption algorithms fields size definition (bytes) */
+#define AIRPDCAP_WEP_KEY_MINLEN 1
+#define AIRPDCAP_WEP_KEY_MAXLEN 32
+#define AIRPDCAP_WEP_40_KEY_LEN 5
+#define AIRPDCAP_WEP_104_KEY_LEN 13
+
+#define AIRPDCAP_WPA_PASSPHRASE_MIN_LEN 8
+#define AIRPDCAP_WPA_PASSPHRASE_MAX_LEN 63 /* null-terminated string, the actual length of the storage is 64 */
+#define AIRPDCAP_WPA_SSID_MIN_LEN 0
+#define AIRPDCAP_WPA_SSID_MAX_LEN 32
+#define AIRPDCAP_WPA_PSK_LEN 64
+#define AIRPDCAP_WPA_PMK_LEN 32
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Macro definitions */
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Type definitions */
+/* */
+/**
+ * Struct to store info about a specific decryption key.
+ */
+typedef struct {
+ GString *key;
+ GString *ssid;
+ guint bits;
+ guint type;
+} decryption_key_t;
+
+/**
+ * Key item used during the decryption process.
+ */
+typedef struct _AIRPDCAP_KEY_ITEM {
+ /**
+ * Type of key. The type will remain unchanged during the
+ * processing, even if some fields could be changed (e.g., WPA
+ * fields).
+ * @note
+ * You can use constants AIRPDCAP_KEY_TYPE_xxx to indicate the
+ * key type.
+ */
+ UINT8 KeyType;
+
+ /**
+ * Key data.
+ * This field can be used for the following decryptographic
+ * algorithms: WEP-40, with a key of 40 bits (10 hex-digits);
+ * WEP-104, with a key of 104 bits (or 26 hex-digits); WPA or
+ * WPA2.
+ * @note
+ * For WPA/WPA2, the PMK is calculated from the PSK, and the PSK
+ * is calculated from the passphrase-SSID pair. You can enter one
+ * of these 3 values and subsequent fields will be automatically
+ * calculated.
+ * @note
+ * For WPA and WPA2 this implementation will use standards as
+ * defined in 802.11i (2004) and 802.1X (2004).
+ */
+ union AIRPDCAP_KEY_ITEMDATA {
+ struct AIRPDCAP_KEY_ITEMDATA_WEP {
+ /**
+ * The binary value of the WEP key.
+ * @note
+ * It is accepted a key of lenght between
+ * AIRPDCAP_WEP_KEY_MINLEN and
+ * AIRPDCAP_WEP_KEY_MAXLEN. A WEP key
+ * standard-compliante should be either 40 bits
+ * (10 hex-digits, 5 bytes) for WEP-40 or 104 bits
+ * (26 hex-digits, 13 bytes) for WEP-104.
+ */
+ UCHAR WepKey[AIRPDCAP_WEP_KEY_MAXLEN];
+ /**
+ * The length of the WEP key. Acceptable range
+ * is [AIRPDCAP_WEP_KEY_MINLEN;AIRPDCAP_WEP_KEY_MAXLEN].
+ */
+ size_t WepKeyLen;
+ } Wep;
+
+ /**
+ * WPA/WPA2 key data. Note that the decryption process
+ * will use the PMK (equal to PSK), that is calculated
+ * from passphrase-SSID pair. You can define one of these
+ * three fields and necessary fields will be automatically
+ * calculated.
+ */
+ union AIRPDCAP_KEY_ITEMDATA_WPA {
+ struct AIRPDCAP_KEY_ITEMDATA_PWD {
+ /**
+ * The string (null-terminated) value of
+ * the passphrase.
+ */
+ CHAR Passphrase[AIRPDCAP_WPA_PASSPHRASE_MAX_LEN+1];
+ /**
+ * The value of the SSID (up to
+ * AIRPDCAP_WPA_SSID_MAX_LEN octets).
+ * @note
+ * A zero-length SSID indicates broadcast.
+ */
+ CHAR Ssid[AIRPDCAP_WPA_SSID_MAX_LEN];
+ /**
+ *The length of the SSID
+ */
+ size_t SsidLen;
+ } UserPwd;
+
+ UCHAR Psk[AIRPDCAP_WPA_PSK_LEN];
+
+ UCHAR Pmk[AIRPDCAP_WPA_PMK_LEN];
+ } Wpa;
+ } KeyData;
+} AIRPDCAP_KEY_ITEM, *PAIRPDCAP_KEY_ITEM;
+
+/**
+ * Collection of keys to use to decrypt packets
+ */
+typedef struct _AIRPDCAP_KEYS_COLLECTION {
+ /**
+ * Number of stored keys
+ */
+ size_t nKeys;
+
+ /**
+ * Array of nKeys keys
+ */
+ AIRPDCAP_KEY_ITEM Keys[256];
+} AIRPDCAP_KEYS_COLLECTION, *PAIRPDCAP_KEYS_COLLECTION;
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Function prototype declarations */
+/* */
+/* */
+/* */
+/******************************************************************************/
+
+#endif /* _AIRPDCAP_USER_H */
diff --git a/epan/crypt/airpdcap_wep.c b/epan/crypt/airpdcap_wep.c
new file mode 100644
index 0000000000..1501d61155
--- /dev/null
+++ b/epan/crypt/airpdcap_wep.c
@@ -0,0 +1,67 @@
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_system.h"
+#include "airpdcap_int.h"
+
+#include "airpdcap_wep.h"
+
+#include "airpdcap_debug.h"
+/* */
+/******************************************************************************/
+
+extern const UINT32 crc32_table[256];
+
+/* Note: copied from FreeBSD source code, RELENG 6, */
+/* sys/net80211/ieee80211_crypto_wep.c, 391 */
+INT AirPDcapWepDecrypt(
+ const UCHAR *seed,
+ const size_t seed_len,
+ UCHAR *cypher_text,
+ const size_t data_len)
+{
+ UINT32 i, j, k, crc;
+ UINT8 S[256];
+ UINT8 icv[4];
+ size_t buflen;
+
+ /* Generate key stream (RC4 Pseude-Random Number Generator) */
+ for (i = 0; i < 256; i++)
+ S[i] = (UINT8)i;
+ for (j = i = 0; i < 256; i++) {
+ j = (j + S[i] + seed[i % seed_len]) & 0xff;
+ S_SWAP(i, j);
+ }
+
+ /* Apply RC4 to data and compute CRC32 over decrypted data */
+ crc = ~(UINT32)0;
+ buflen = data_len;
+
+ for (i = j = k = 0; k < buflen; k++) {
+ i = (i + 1) & 0xff;
+ j = (j + S[i]) & 0xff;
+ S_SWAP(i, j);
+ *cypher_text ^= S[(S[i] + S[j]) & 0xff];
+ crc = crc32_table[(crc ^ *cypher_text) & 0xff] ^ (crc >> 8);
+ cypher_text++;
+ }
+
+ crc = ~crc;
+
+ /* Encrypt little-endian CRC32 and verify that it matches with the received ICV */
+ icv[0] = (UINT8)crc;
+ icv[1] = (UINT8)(crc >> 8);
+ icv[2] = (UINT8)(crc >> 16);
+ icv[3] = (UINT8)(crc >> 24);
+ for (k = 0; k < 4; k++) {
+ i = (i + 1) & 0xff;
+ j = (j + S[i]) & 0xff;
+ S_SWAP(i, j);
+ if ((icv[k] ^ S[(S[i] + S[j]) & 0xff]) != *cypher_text++) {
+ /* ICV mismatch - drop frame */
+ return AIRPDCAP_RET_UNSUCCESS;
+ }
+ }
+
+ return AIRPDCAP_RET_SUCCESS;
+}
diff --git a/epan/crypt/airpdcap_wep.h b/epan/crypt/airpdcap_wep.h
new file mode 100644
index 0000000000..a7885c18f6
--- /dev/null
+++ b/epan/crypt/airpdcap_wep.h
@@ -0,0 +1,78 @@
+#ifndef _AIRPDCAP_WEP
+#define _AIRPDCAP_WEP
+
+/******************************************************************************/
+/* File includes */
+/* */
+#include "airpdcap_interop.h"
+/* */
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* Type definitions */
+/* */
+/* Note: copied from net80211/ieee80211_cripto_wep.c of FreeBSD source */
+static const UINT32 crc32_table[256] = {
+ 0x00000000L, 0x77073096L, 0xee0e612cL, 0x990951baL, 0x076dc419L,
+ 0x706af48fL, 0xe963a535L, 0x9e6495a3L, 0x0edb8832L, 0x79dcb8a4L,
+ 0xe0d5e91eL, 0x97d2d988L, 0x09b64c2bL, 0x7eb17cbdL, 0xe7b82d07L,
+ 0x90bf1d91L, 0x1db71064L, 0x6ab020f2L, 0xf3b97148L, 0x84be41deL,
+ 0x1adad47dL, 0x6ddde4ebL, 0xf4d4b551L, 0x83d385c7L, 0x136c9856L,
+ 0x646ba8c0L, 0xfd62f97aL, 0x8a65c9ecL, 0x14015c4fL, 0x63066cd9L,
+ 0xfa0f3d63L, 0x8d080df5L, 0x3b6e20c8L, 0x4c69105eL, 0xd56041e4L,
+ 0xa2677172L, 0x3c03e4d1L, 0x4b04d447L, 0xd20d85fdL, 0xa50ab56bL,
+ 0x35b5a8faL, 0x42b2986cL, 0xdbbbc9d6L, 0xacbcf940L, 0x32d86ce3L,
+ 0x45df5c75L, 0xdcd60dcfL, 0xabd13d59L, 0x26d930acL, 0x51de003aL,
+ 0xc8d75180L, 0xbfd06116L, 0x21b4f4b5L, 0x56b3c423L, 0xcfba9599L,
+ 0xb8bda50fL, 0x2802b89eL, 0x5f058808L, 0xc60cd9b2L, 0xb10be924L,
+ 0x2f6f7c87L, 0x58684c11L, 0xc1611dabL, 0xb6662d3dL, 0x76dc4190L,
+ 0x01db7106L, 0x98d220bcL, 0xefd5102aL, 0x71b18589L, 0x06b6b51fL,
+ 0x9fbfe4a5L, 0xe8b8d433L, 0x7807c9a2L, 0x0f00f934L, 0x9609a88eL,
+ 0xe10e9818L, 0x7f6a0dbbL, 0x086d3d2dL, 0x91646c97L, 0xe6635c01L,
+ 0x6b6b51f4L, 0x1c6c6162L, 0x856530d8L, 0xf262004eL, 0x6c0695edL,
+ 0x1b01a57bL, 0x8208f4c1L, 0xf50fc457L, 0x65b0d9c6L, 0x12b7e950L,
+ 0x8bbeb8eaL, 0xfcb9887cL, 0x62dd1ddfL, 0x15da2d49L, 0x8cd37cf3L,
+ 0xfbd44c65L, 0x4db26158L, 0x3ab551ceL, 0xa3bc0074L, 0xd4bb30e2L,
+ 0x4adfa541L, 0x3dd895d7L, 0xa4d1c46dL, 0xd3d6f4fbL, 0x4369e96aL,
+ 0x346ed9fcL, 0xad678846L, 0xda60b8d0L, 0x44042d73L, 0x33031de5L,
+ 0xaa0a4c5fL, 0xdd0d7cc9L, 0x5005713cL, 0x270241aaL, 0xbe0b1010L,
+ 0xc90c2086L, 0x5768b525L, 0x206f85b3L, 0xb966d409L, 0xce61e49fL,
+ 0x5edef90eL, 0x29d9c998L, 0xb0d09822L, 0xc7d7a8b4L, 0x59b33d17L,
+ 0x2eb40d81L, 0xb7bd5c3bL, 0xc0ba6cadL, 0xedb88320L, 0x9abfb3b6L,
+ 0x03b6e20cL, 0x74b1d29aL, 0xead54739L, 0x9dd277afL, 0x04db2615L,
+ 0x73dc1683L, 0xe3630b12L, 0x94643b84L, 0x0d6d6a3eL, 0x7a6a5aa8L,
+ 0xe40ecf0bL, 0x9309ff9dL, 0x0a00ae27L, 0x7d079eb1L, 0xf00f9344L,
+ 0x8708a3d2L, 0x1e01f268L, 0x6906c2feL, 0xf762575dL, 0x806567cbL,
+ 0x196c3671L, 0x6e6b06e7L, 0xfed41b76L, 0x89d32be0L, 0x10da7a5aL,
+ 0x67dd4accL, 0xf9b9df6fL, 0x8ebeeff9L, 0x17b7be43L, 0x60b08ed5L,
+ 0xd6d6a3e8L, 0xa1d1937eL, 0x38d8c2c4L, 0x4fdff252L, 0xd1bb67f1L,
+ 0xa6bc5767L, 0x3fb506ddL, 0x48b2364bL, 0xd80d2bdaL, 0xaf0a1b4cL,
+ 0x36034af6L, 0x41047a60L, 0xdf60efc3L, 0xa867df55L, 0x316e8eefL,
+ 0x4669be79L, 0xcb61b38cL, 0xbc66831aL, 0x256fd2a0L, 0x5268e236L,
+ 0xcc0c7795L, 0xbb0b4703L, 0x220216b9L, 0x5505262fL, 0xc5ba3bbeL,
+ 0xb2bd0b28L, 0x2bb45a92L, 0x5cb36a04L, 0xc2d7ffa7L, 0xb5d0cf31L,
+ 0x2cd99e8bL, 0x5bdeae1dL, 0x9b64c2b0L, 0xec63f226L, 0x756aa39cL,
+ 0x026d930aL, 0x9c0906a9L, 0xeb0e363fL, 0x72076785L, 0x05005713L,
+ 0x95bf4a82L, 0xe2b87a14L, 0x7bb12baeL, 0x0cb61b38L, 0x92d28e9bL,
+ 0xe5d5be0dL, 0x7cdcefb7L, 0x0bdbdf21L, 0x86d3d2d4L, 0xf1d4e242L,
+ 0x68ddb3f8L, 0x1fda836eL, 0x81be16cdL, 0xf6b9265bL, 0x6fb077e1L,
+ 0x18b74777L, 0x88085ae6L, 0xff0f6a70L, 0x66063bcaL, 0x11010b5cL,
+ 0x8f659effL, 0xf862ae69L, 0x616bffd3L, 0x166ccf45L, 0xa00ae278L,
+ 0xd70dd2eeL, 0x4e048354L, 0x3903b3c2L, 0xa7672661L, 0xd06016f7L,
+ 0x4969474dL, 0x3e6e77dbL, 0xaed16a4aL, 0xd9d65adcL, 0x40df0b66L,
+ 0x37d83bf0L, 0xa9bcae53L, 0xdebb9ec5L, 0x47b2cf7fL, 0x30b5ffe9L,
+ 0xbdbdf21cL, 0xcabac28aL, 0x53b39330L, 0x24b4a3a6L, 0xbad03605L,
+ 0xcdd70693L, 0x54de5729L, 0x23d967bfL, 0xb3667a2eL, 0xc4614ab8L,
+ 0x5d681b02L, 0x2a6f2b94L, 0xb40bbe37L, 0xc30c8ea1L, 0x5a05df1bL,
+ 0x2d02ef8dL};
+/* */
+/******************************************************************************/
+
+/******************************************************************************/
+/* External function prototypes declarations */
+/* */
+/* */
+/******************************************************************************/
+
+#endif /* _AIRPDCAP_WEP */
diff --git a/epan/crypt/airpdcap_ws.h b/epan/crypt/airpdcap_ws.h
new file mode 100644
index 0000000000..6eec4d0ff6
--- /dev/null
+++ b/epan/crypt/airpdcap_ws.h
@@ -0,0 +1,7 @@
+#ifndef _AIRPDCAP_WS_H
+#define _AIRPDCAP_WS_H
+
+#include "airpdcap_system.h"
+WS_VAR_IMPORT AIRPDCAP_CONTEXT airpdcap_ctx;
+
+#endif /* _AIRPDCAP_WS_H */