Browse Source

[LDRA] 9 S : 식에 할당 작업이 있다. - 식에 ‘=’ 연산자가 한번에 처리 되고 있어서 해당 연산자 나눠서 코드 수정

feature/ldra
leehagjoon(이학준) 1 year ago
parent
commit
7635692998
  1. 24
      src/main/java/com/palnet/server/encrptn/kisa/KISA_SEED_CBC.java
  2. 8
      src/main/java/com/palnet/server/encrptn/kisa/KISA_SHA256.java

24
src/main/java/com/palnet/server/encrptn/kisa/KISA_SEED_CBC.java

@ -398,7 +398,8 @@ public class KISA_SEED_CBC {
K = pInfo.seed_key.key_data; // Pointer of round keys K = pInfo.seed_key.key_data; // Pointer of round keys
pInfo.encrypt = enc.value; // pInfo.encrypt = enc.value; //
Common.memcpy(pInfo.ivec, pbszIV, 16, ENDIAN); Common.memcpy(pInfo.ivec, pbszIV, 16, ENDIAN);
pInfo.last_block_flag = pInfo.buffer_length = 0; pInfo.buffer_length = 0;
pInfo.last_block_flag = pInfo.buffer_length;
// Set up input values for Key Schedule // Set up input values for Key Schedule
ABCD[ABCD_A] = Common.byte_to_int(pbszUserKey, 0*4, ENDIAN); ABCD[ABCD_A] = Common.byte_to_int(pbszUserKey, 0*4, ENDIAN);
@ -736,11 +737,23 @@ public class KISA_SEED_CBC {
public KISA_SEED_INFO() { public KISA_SEED_INFO() {
encrypt = 0; encrypt = 0;
ivec[0] = ivec[1] = ivec[2] = ivec[3] = 0; ivec[3] = 0;
ivec[2] = ivec[3];
ivec[1] = ivec[2];
ivec[0] = ivec[1];
// ivec[0] = ivec[1] = ivec[2] = ivec[3] = 0;
seed_key.init(); seed_key.init();
cbc_buffer[0] = cbc_buffer[1] = cbc_buffer[2] = cbc_buffer[3] = 0; cbc_buffer[3] = 0;
cbc_buffer[2] = cbc_buffer[3];
cbc_buffer[1] = cbc_buffer[2];
cbc_buffer[0] = cbc_buffer[1];
// cbc_buffer[0] = cbc_buffer[1] = cbc_buffer[2] = cbc_buffer[3] = 0;
buffer_length = 0; buffer_length = 0;
cbc_last_block[0] = cbc_last_block[1] = cbc_last_block[2] = cbc_last_block[3] = 0; cbc_last_block[3] = 0;
cbc_last_block[2] = cbc_last_block[3];
cbc_last_block[1] = cbc_last_block[2];
cbc_last_block[0] = cbc_last_block[1];
// cbc_last_block[0] = cbc_last_block[1] = cbc_last_block[2] = cbc_last_block[3] = 0;
last_block_flag = 0; last_block_flag = 0;
} }
@ -940,7 +953,8 @@ public class KISA_SEED_CBC {
K = pInfo.seed_key.key_data; // Pointer of round keys K = pInfo.seed_key.key_data; // Pointer of round keys
pInfo.encrypt = enc.value; // pInfo.encrypt = enc.value; //
Common.memcpy(pInfo.ivec, pbszIV, 16, ENDIAN); Common.memcpy(pInfo.ivec, pbszIV, 16, ENDIAN);
pInfo.last_block_flag = pInfo.buffer_length = 0; pInfo.buffer_length = 0;
pInfo.last_block_flag = pInfo.buffer_length;
// Set up input values for Key Schedule // Set up input values for Key Schedule
ABCD[ABCD_A] = Common.byte_to_int(pbszUserKey, 0*4, ENDIAN); ABCD[ABCD_A] = Common.byte_to_int(pbszUserKey, 0*4, ENDIAN);

8
src/main/java/com/palnet/server/encrptn/kisa/KISA_SHA256.java

@ -135,8 +135,9 @@ public class KISA_SHA256 {
Info.uChainVar[5] = 0x9b05688c; Info.uChainVar[5] = 0x9b05688c;
Info.uChainVar[6] = 0x1f83d9ab; Info.uChainVar[6] = 0x1f83d9ab;
Info.uChainVar[7] = 0x5be0cd19; Info.uChainVar[7] = 0x5be0cd19;
Info.uLowLength = 0;
Info.uHighLength = Info.uLowLength = 0; Info.uHighLength = Info.uLowLength;
// Info.uHighLength = Info.uLowLength = 0;
} }
/** /**
@ -148,7 +149,8 @@ public class KISA_SHA256 {
public static void SHA256_Process( SHA256_INFO Info, byte[] pszMessage, int uDataLen ) { public static void SHA256_Process( SHA256_INFO Info, byte[] pszMessage, int uDataLen ) {
int pszMessage_offset; int pszMessage_offset;
if((Info.uLowLength += (uDataLen << 3)) < 0) { Info.uLowLength += (uDataLen <<3);
if(Info.uLowLength < 0) {
Info.uHighLength++; Info.uHighLength++;
} }

Loading…
Cancel
Save