+++ /dev/null
-/* -*-c-*-
- *
- * $Id: rijndael.c,v 1.5 2004/04/08 01:36:15 mdw Exp $
- *
- * The Rijndael block cipher
- *
- * (c) 2000 Straylight/Edgeware
- */
-
-/*----- Licensing notice --------------------------------------------------*
- *
- * This file is part of Catacomb.
- *
- * Catacomb is free software; you can redistribute it and/or modify
- * it under the terms of the GNU Library General Public License as
- * published by the Free Software Foundation; either version 2 of the
- * License, or (at your option) any later version.
- *
- * Catacomb is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU Library General Public License for more details.
- *
- * You should have received a copy of the GNU Library General Public
- * License along with Catacomb; if not, write to the Free
- * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
- * MA 02111-1307, USA.
- */
-
-/*----- Header files ------------------------------------------------------*/
-
-#include <assert.h>
-#include <stdio.h>
-
-#include <mLib/bits.h>
-
-#include "blkc.h"
-#include "gcipher.h"
-#include "rijndael.h"
-#include "rijndael-base.h"
-
-/*----- Main code ---------------------------------------------------------*/
-
-/* --- @rijndael_init@ --- *
- *
- * Arguments: @rijndael_ctx *k@ = pointer to context to initialize
- * @const void *buf@ = pointer to buffer of key material
- * @size_t sz@ = size of the key material
- *
- * Returns: ---
- *
- * Use: Initializes a Rijndael context with a particular key. This
- * implementation of Rijndael doesn't impose any particular
- * limits on the key size except that it must be multiple of 4
- * bytes long. 256 bits seems sensible, though.
- */
-
-void rijndael_init(rijndael_ctx *k, const void *buf, size_t sz)
-{
- rijndael_setup(k, RIJNDAEL_BLKSZ / 4, buf, sz);
-}
-
-/* --- @rijndael_eblk@, @rijndael_dblk@ --- *
- *
- * Arguments: @const rijndael_ctx *k@ = pointer to Rijndael context
- * @const uint32 s[4]@ = pointer to source block
- * @uint32 d[4]@ = pointer to destination block
- *
- * Returns: ---
- *
- * Use: Low-level block encryption and decryption.
- */
-
-#define DO(what, t, aa, bb, cc, dd, a, b, c, d, w) do { \
- aa = what(t, a, b, c, d) ^ *w++; \
- bb = what(t, b, c, d, a) ^ *w++; \
- cc = what(t, c, d, a, b) ^ *w++; \
- dd = what(t, d, a, b, c) ^ *w++; \
-} while (0)
-
-#define UNDO(what, t, aa, bb, cc, dd, a, b, c, d, w) do { \
- aa = what(t, a, d, c, b) ^ *w++; \
- bb = what(t, b, a, d, c) ^ *w++; \
- cc = what(t, c, b, a, d) ^ *w++; \
- dd = what(t, d, c, b, a) ^ *w++; \
-} while (0)
-
-void rijndael_eblk(const rijndael_ctx *k, const uint32 *s, uint32 *dst)
-{
- uint32 a = s[0], b = s[1], c = s[2], d = s[3];
- uint32 aa, bb, cc, dd;
- const uint32 *w = k->w;
-
- a ^= *w++; b ^= *w++; c ^= *w++; d ^= *w++;
- aa = a; bb = b; cc = c; dd = d;
-
- switch (k->nr) {
- case 14:
- DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
- case 13:
- DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
- case 12:
- DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
- case 11:
- DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
- case 10:
- default:
- DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
- DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
- DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
- DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
- DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
- DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
- DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
- DO(MIX, T, a, b, c, d, aa, bb, cc, dd, w);
- DO(MIX, T, aa, bb, cc, dd, a, b, c, d, w);
- }
- DO(SUB, S, a, b, c, d, aa, bb, cc, dd, w);
-
- dst[0] = a; dst[1] = b; dst[2] = c; dst[3] = d;
-}
-
-void rijndael_dblk(const rijndael_ctx *k, const uint32 *s, uint32 *dst)
-{
- uint32 a = s[0], b = s[1], c = s[2], d = s[3];
- uint32 aa, bb, cc, dd;
- const uint32 *w = k->wi;
-
- a ^= *w++; b ^= *w++; c ^= *w++; d ^= *w++;
- aa = a; bb = b; cc = c; dd = d;
-
- switch (k->nr) {
- case 14:
- UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
- case 13:
- UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
- case 12:
- UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
- case 11:
- UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
- case 10:
- default:
- UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
- UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
- UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
- UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
- UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
- UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
- UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
- UNDO(MIX, TI, a, b, c, d, aa, bb, cc, dd, w);
- UNDO(MIX, TI, aa, bb, cc, dd, a, b, c, d, w);
- }
- UNDO(SUB, SI, a, b, c, d, aa, bb, cc, dd, w);
-
- dst[0] = a; dst[1] = b; dst[2] = c; dst[3] = d;
-}
-
-BLKC_TEST(RIJNDAEL, rijndael)
-
-/*----- That's all, folks -------------------------------------------------*/