diff options
author | Niels Möller <nisse@lysator.liu.se> | 2013-05-17 17:31:08 +0200 |
---|---|---|
committer | Niels Möller <nisse@lysator.liu.se> | 2013-05-17 17:31:08 +0200 |
commit | ff29d0a9c9b7d17e0bc15bbba88993244903222b (patch) | |
tree | 3c989488833e31cc1dc218dbf8da8dd480a8f434 /aes-decrypt-internal.c | |
parent | 982961a54280f9ff791bccc50f5b6a3e169de402 (diff) | |
download | nettle-ff29d0a9c9b7d17e0bc15bbba88993244903222b.tar.gz |
Separate rounds and key arguments to _aes_encrypt and _aes_decrypt.
Diffstat (limited to 'aes-decrypt-internal.c')
-rw-r--r-- | aes-decrypt-internal.c | 34 |
1 files changed, 17 insertions, 17 deletions
diff --git a/aes-decrypt-internal.c b/aes-decrypt-internal.c index af2891e9..be73e680 100644 --- a/aes-decrypt-internal.c +++ b/aes-decrypt-internal.c @@ -5,7 +5,7 @@ /* nettle, low-level cryptographics library * - * Copyright (C) 2002 Niels Möller + * Copyright (C) 2002, 2013 Niels Möller * * The nettle library is free software; you can redistribute it and/or modify * it under the terms of the GNU Lesser General Public License as published by @@ -33,7 +33,7 @@ #include "macros.h" void -_nettle_aes_decrypt(const struct aes_ctx *ctx, +_nettle_aes_decrypt(unsigned rounds, const uint32_t *keys, const struct aes_table *T, size_t length, uint8_t *dst, const uint8_t *src) @@ -42,22 +42,22 @@ _nettle_aes_decrypt(const struct aes_ctx *ctx, { uint32_t w0, w1, w2, w3; /* working ciphertext */ uint32_t t0, t1, t2, t3; - unsigned round; + unsigned i; /* Get clear text, using little-endian byte order. * Also XOR with the first subkey. */ - w0 = LE_READ_UINT32(src) ^ ctx->keys[0]; - w1 = LE_READ_UINT32(src + 4) ^ ctx->keys[1]; - w2 = LE_READ_UINT32(src + 8) ^ ctx->keys[2]; - w3 = LE_READ_UINT32(src + 12) ^ ctx->keys[3]; + w0 = LE_READ_UINT32(src) ^ keys[0]; + w1 = LE_READ_UINT32(src + 4) ^ keys[1]; + w2 = LE_READ_UINT32(src + 8) ^ keys[2]; + w3 = LE_READ_UINT32(src + 12) ^ keys[3]; - for (round = 1; round < ctx->nrounds; round++) + for (i = 1; i < rounds; i++) { - t0 = AES_ROUND(T, w0, w3, w2, w1, ctx->keys[4*round]); - t1 = AES_ROUND(T, w1, w0, w3, w2, ctx->keys[4*round + 1]); - t2 = AES_ROUND(T, w2, w1, w0, w3, ctx->keys[4*round + 2]); - t3 = AES_ROUND(T, w3, w2, w1, w0, ctx->keys[4*round + 3]); + t0 = AES_ROUND(T, w0, w3, w2, w1, keys[4*i]); + t1 = AES_ROUND(T, w1, w0, w3, w2, keys[4*i + 1]); + t2 = AES_ROUND(T, w2, w1, w0, w3, keys[4*i + 2]); + t3 = AES_ROUND(T, w3, w2, w1, w0, keys[4*i + 3]); /* We could unroll the loop twice, to avoid these assignments. If all eight variables fit in registers, @@ -70,14 +70,14 @@ _nettle_aes_decrypt(const struct aes_ctx *ctx, /* Final round */ - t0 = AES_FINAL_ROUND(T, w0, w3, w2, w1, ctx->keys[4*round]); - t1 = AES_FINAL_ROUND(T, w1, w0, w3, w2, ctx->keys[4*round + 1]); - t2 = AES_FINAL_ROUND(T, w2, w1, w0, w3, ctx->keys[4*round + 2]); - t3 = AES_FINAL_ROUND(T, w3, w2, w1, w0, ctx->keys[4*round + 3]); + t0 = AES_FINAL_ROUND(T, w0, w3, w2, w1, keys[4*i]); + t1 = AES_FINAL_ROUND(T, w1, w0, w3, w2, keys[4*i + 1]); + t2 = AES_FINAL_ROUND(T, w2, w1, w0, w3, keys[4*i + 2]); + t3 = AES_FINAL_ROUND(T, w3, w2, w1, w0, keys[4*i + 3]); LE_WRITE_UINT32(dst, t0); - LE_WRITE_UINT32(dst + 8, t2); LE_WRITE_UINT32(dst + 4, t1); + LE_WRITE_UINT32(dst + 8, t2); LE_WRITE_UINT32(dst + 12, t3); } } |