summaryrefslogtreecommitdiff
path: root/aes-decrypt-internal.c
diff options
context:
space:
mode:
authorNiels Möller <nisse@lysator.liu.se>2013-05-17 17:31:08 +0200
committerNiels Möller <nisse@lysator.liu.se>2013-05-17 17:31:08 +0200
commitff29d0a9c9b7d17e0bc15bbba88993244903222b (patch)
tree3c989488833e31cc1dc218dbf8da8dd480a8f434 /aes-decrypt-internal.c
parent982961a54280f9ff791bccc50f5b6a3e169de402 (diff)
downloadnettle-ff29d0a9c9b7d17e0bc15bbba88993244903222b.tar.gz
Separate rounds and key arguments to _aes_encrypt and _aes_decrypt.
Diffstat (limited to 'aes-decrypt-internal.c')
-rw-r--r--aes-decrypt-internal.c34
1 files changed, 17 insertions, 17 deletions
diff --git a/aes-decrypt-internal.c b/aes-decrypt-internal.c
index af2891e9..be73e680 100644
--- a/aes-decrypt-internal.c
+++ b/aes-decrypt-internal.c
@@ -5,7 +5,7 @@
/* nettle, low-level cryptographics library
*
- * Copyright (C) 2002 Niels Möller
+ * Copyright (C) 2002, 2013 Niels Möller
*
* The nettle library is free software; you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
@@ -33,7 +33,7 @@
#include "macros.h"
void
-_nettle_aes_decrypt(const struct aes_ctx *ctx,
+_nettle_aes_decrypt(unsigned rounds, const uint32_t *keys,
const struct aes_table *T,
size_t length, uint8_t *dst,
const uint8_t *src)
@@ -42,22 +42,22 @@ _nettle_aes_decrypt(const struct aes_ctx *ctx,
{
uint32_t w0, w1, w2, w3; /* working ciphertext */
uint32_t t0, t1, t2, t3;
- unsigned round;
+ unsigned i;
/* Get clear text, using little-endian byte order.
* Also XOR with the first subkey. */
- w0 = LE_READ_UINT32(src) ^ ctx->keys[0];
- w1 = LE_READ_UINT32(src + 4) ^ ctx->keys[1];
- w2 = LE_READ_UINT32(src + 8) ^ ctx->keys[2];
- w3 = LE_READ_UINT32(src + 12) ^ ctx->keys[3];
+ w0 = LE_READ_UINT32(src) ^ keys[0];
+ w1 = LE_READ_UINT32(src + 4) ^ keys[1];
+ w2 = LE_READ_UINT32(src + 8) ^ keys[2];
+ w3 = LE_READ_UINT32(src + 12) ^ keys[3];
- for (round = 1; round < ctx->nrounds; round++)
+ for (i = 1; i < rounds; i++)
{
- t0 = AES_ROUND(T, w0, w3, w2, w1, ctx->keys[4*round]);
- t1 = AES_ROUND(T, w1, w0, w3, w2, ctx->keys[4*round + 1]);
- t2 = AES_ROUND(T, w2, w1, w0, w3, ctx->keys[4*round + 2]);
- t3 = AES_ROUND(T, w3, w2, w1, w0, ctx->keys[4*round + 3]);
+ t0 = AES_ROUND(T, w0, w3, w2, w1, keys[4*i]);
+ t1 = AES_ROUND(T, w1, w0, w3, w2, keys[4*i + 1]);
+ t2 = AES_ROUND(T, w2, w1, w0, w3, keys[4*i + 2]);
+ t3 = AES_ROUND(T, w3, w2, w1, w0, keys[4*i + 3]);
/* We could unroll the loop twice, to avoid these
assignments. If all eight variables fit in registers,
@@ -70,14 +70,14 @@ _nettle_aes_decrypt(const struct aes_ctx *ctx,
/* Final round */
- t0 = AES_FINAL_ROUND(T, w0, w3, w2, w1, ctx->keys[4*round]);
- t1 = AES_FINAL_ROUND(T, w1, w0, w3, w2, ctx->keys[4*round + 1]);
- t2 = AES_FINAL_ROUND(T, w2, w1, w0, w3, ctx->keys[4*round + 2]);
- t3 = AES_FINAL_ROUND(T, w3, w2, w1, w0, ctx->keys[4*round + 3]);
+ t0 = AES_FINAL_ROUND(T, w0, w3, w2, w1, keys[4*i]);
+ t1 = AES_FINAL_ROUND(T, w1, w0, w3, w2, keys[4*i + 1]);
+ t2 = AES_FINAL_ROUND(T, w2, w1, w0, w3, keys[4*i + 2]);
+ t3 = AES_FINAL_ROUND(T, w3, w2, w1, w0, keys[4*i + 3]);
LE_WRITE_UINT32(dst, t0);
- LE_WRITE_UINT32(dst + 8, t2);
LE_WRITE_UINT32(dst + 4, t1);
+ LE_WRITE_UINT32(dst + 8, t2);
LE_WRITE_UINT32(dst + 12, t3);
}
}