head 1.3;
access;
symbols;
locks; strict;
comment @ * @;
1.3
date 94.03.11.23.14.20; author paul; state Exp;
branches;
next 1.2;
1.2
date 93.11.24.22.34.29; author paul; state Exp;
branches;
next 1.1;
1.1
date 93.06.14.20.37.07; author paul; state Exp;
branches;
next ;
desc
@@
1.3
log
@New copyright statement.
@
text
@/*
* Copyright (c) 1985 Corporation for Research and Educational Networking
* Copyright (c) 1988 University of Illinois Board of Trustees, Steven
* Dorner, and Paul Pomes
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the Corporation for
* Research and Educational Networking (CREN), the University of
* Illinois at Urbana, and their contributors.
* 4. Neither the name of CREN, the University nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE TRUSTEES AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE TRUSTEES OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
seed = 123;
for (i = 0; i < 13; i++)
seed = seed * buf[i] + i;
for (i = 0; i < ROTORSZ; i++)
t1[i] = i;
for (i = 0; i < ROTORSZ; i++)
{
seed = 5 * seed + buf[i % 13];
random = seed % 65521;
k = ROTORSZ - 1 - i;
ic = (random & MASK) % (k + 1);
random >>= 8;
temp = t1[k];
t1[k] = t1[ic];
t1[ic] = temp;
if (t3[k] != 0)
continue;
ic = (random & MASK) % k;
while (t3[ic] != 0)
ic = (ic + 1) % k;
t3[k] = ic;
t3[ic] = k;
}
for (i = 0; i < ROTORSZ; i++)
t2[t1[i] & MASK] = i;
}
/*
* encrypts a string
* first byte of string is encoded length of string
* returns length of encoded string
*/
int
encryptit(to, from)
char *to, *from;
{
char scratch[4096];
char *sp;
1.2
log
@Assume ints are 32 bits. Longs on alphas and others are 64 bits - not
what always is wanted.
@
text
@d1 40
a40 1
#include "qiapi.h"
d48 1
a51 8
/*
* This software is Copyright (C) 1988 by Steven Dorner and the
* University of Illinois Board of Trustees, and by CSNET. No warranties of
* any kind are expressed or implied. No support will be provided.
* This software may not be redistributed without prior consent of CSNET.
* You may direct questions to nameserv@@uiuc.edu
*/
@
1.1
log
@Initial revision
@
text
@d118 1
a118 1
long seed;
@