staging: crypto: skein: fix leading whitespace
Signed-off-by: Jason Cooper <jason@lakedaemon.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
e6d336f5c6
commit
39bd42b085
|
@ -38,11 +38,11 @@
|
|||
#define Skein_Swap64(w64) (w64)
|
||||
|
||||
enum
|
||||
{
|
||||
SKEIN_SUCCESS = 0, /* return codes from Skein calls */
|
||||
SKEIN_FAIL = 1,
|
||||
SKEIN_BAD_HASHLEN = 2
|
||||
};
|
||||
{
|
||||
SKEIN_SUCCESS = 0, /* return codes from Skein calls */
|
||||
SKEIN_FAIL = 1,
|
||||
SKEIN_BAD_HASHLEN = 2
|
||||
};
|
||||
|
||||
#define SKEIN_MODIFIER_WORDS (2) /* number of modifier (tweak) words */
|
||||
|
||||
|
@ -64,32 +64,32 @@ enum
|
|||
#define SKEIN1024_BLOCK_BYTES (8*SKEIN1024_STATE_WORDS)
|
||||
|
||||
struct skein_ctx_hdr
|
||||
{
|
||||
size_t hashBitLen; /* size of hash result, in bits */
|
||||
size_t bCnt; /* current byte count in buffer b[] */
|
||||
u64 T[SKEIN_MODIFIER_WORDS]; /* tweak words: T[0]=byte cnt, T[1]=flags */
|
||||
};
|
||||
{
|
||||
size_t hashBitLen; /* size of hash result, in bits */
|
||||
size_t bCnt; /* current byte count in buffer b[] */
|
||||
u64 T[SKEIN_MODIFIER_WORDS]; /* tweak words: T[0]=byte cnt, T[1]=flags */
|
||||
};
|
||||
|
||||
struct skein_256_ctx /* 256-bit Skein hash context structure */
|
||||
{
|
||||
struct skein_ctx_hdr h; /* common header context variables */
|
||||
u64 X[SKEIN_256_STATE_WORDS]; /* chaining variables */
|
||||
u8 b[SKEIN_256_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
};
|
||||
{
|
||||
struct skein_ctx_hdr h; /* common header context variables */
|
||||
u64 X[SKEIN_256_STATE_WORDS]; /* chaining variables */
|
||||
u8 b[SKEIN_256_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
};
|
||||
|
||||
struct skein_512_ctx /* 512-bit Skein hash context structure */
|
||||
{
|
||||
struct skein_ctx_hdr h; /* common header context variables */
|
||||
u64 X[SKEIN_512_STATE_WORDS]; /* chaining variables */
|
||||
u8 b[SKEIN_512_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
};
|
||||
{
|
||||
struct skein_ctx_hdr h; /* common header context variables */
|
||||
u64 X[SKEIN_512_STATE_WORDS]; /* chaining variables */
|
||||
u8 b[SKEIN_512_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
};
|
||||
|
||||
struct skein1024_ctx /* 1024-bit Skein hash context structure */
|
||||
{
|
||||
struct skein_ctx_hdr h; /* common header context variables */
|
||||
u64 X[SKEIN1024_STATE_WORDS]; /* chaining variables */
|
||||
u8 b[SKEIN1024_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
};
|
||||
{
|
||||
struct skein_ctx_hdr h; /* common header context variables */
|
||||
u64 X[SKEIN1024_STATE_WORDS]; /* chaining variables */
|
||||
u8 b[SKEIN1024_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
};
|
||||
|
||||
/* Skein APIs for (incremental) "straight hashing" */
|
||||
int Skein_256_Init(struct skein_256_ctx *ctx, size_t hashBitLen);
|
||||
|
@ -150,18 +150,18 @@ int Skein1024_Output(struct skein1024_ctx *ctx, u8 *hashVal);
|
|||
|
||||
/* tweak word T[1]: bit field starting positions */
|
||||
#define SKEIN_T1_BIT(BIT) ((BIT) - 64) /* offset 64 because it's the second word */
|
||||
|
||||
|
||||
#define SKEIN_T1_POS_TREE_LVL SKEIN_T1_BIT(112) /* bits 112..118: level in hash tree */
|
||||
#define SKEIN_T1_POS_BIT_PAD SKEIN_T1_BIT(119) /* bit 119 : partial final input byte */
|
||||
#define SKEIN_T1_POS_BLK_TYPE SKEIN_T1_BIT(120) /* bits 120..125: type field */
|
||||
#define SKEIN_T1_POS_FIRST SKEIN_T1_BIT(126) /* bits 126 : first block flag */
|
||||
#define SKEIN_T1_POS_FINAL SKEIN_T1_BIT(127) /* bit 127 : final block flag */
|
||||
|
||||
|
||||
/* tweak word T[1]: flag bit definition(s) */
|
||||
#define SKEIN_T1_FLAG_FIRST (((u64) 1) << SKEIN_T1_POS_FIRST)
|
||||
#define SKEIN_T1_FLAG_FINAL (((u64) 1) << SKEIN_T1_POS_FINAL)
|
||||
#define SKEIN_T1_FLAG_BIT_PAD (((u64) 1) << SKEIN_T1_POS_BIT_PAD)
|
||||
|
||||
|
||||
/* tweak word T[1]: tree level bit field mask */
|
||||
#define SKEIN_T1_TREE_LVL_MASK (((u64)0x7F) << SKEIN_T1_POS_TREE_LVL)
|
||||
#define SKEIN_T1_TREE_LEVEL(n) (((u64) (n)) << SKEIN_T1_POS_TREE_LVL)
|
||||
|
@ -213,9 +213,9 @@ int Skein1024_Output(struct skein1024_ctx *ctx, u8 *hashVal);
|
|||
#define SKEIN_CFG_TREE_MAX_LEVEL_MSK (((u64) 0xFF) << SKEIN_CFG_TREE_MAX_LEVEL_POS)
|
||||
|
||||
#define SKEIN_CFG_TREE_INFO(leaf, node, maxLvl) \
|
||||
((((u64)(leaf)) << SKEIN_CFG_TREE_LEAF_SIZE_POS) | \
|
||||
(((u64)(node)) << SKEIN_CFG_TREE_NODE_SIZE_POS) | \
|
||||
(((u64)(maxLvl)) << SKEIN_CFG_TREE_MAX_LEVEL_POS))
|
||||
((((u64)(leaf)) << SKEIN_CFG_TREE_LEAF_SIZE_POS) | \
|
||||
(((u64)(node)) << SKEIN_CFG_TREE_NODE_SIZE_POS) | \
|
||||
(((u64)(maxLvl)) << SKEIN_CFG_TREE_MAX_LEVEL_POS))
|
||||
|
||||
#define SKEIN_CFG_TREE_INFO_SEQUENTIAL SKEIN_CFG_TREE_INFO(0, 0, 0) /* use as treeInfo in InitExt() call for sequential processing */
|
||||
|
||||
|
@ -233,17 +233,17 @@ int Skein1024_Output(struct skein1024_ctx *ctx, u8 *hashVal);
|
|||
|
||||
/* set both tweak words at once */
|
||||
#define Skein_Set_T0_T1(ctxPtr, T0, T1) \
|
||||
{ \
|
||||
Skein_Set_T0(ctxPtr, (T0)); \
|
||||
Skein_Set_T1(ctxPtr, (T1)); \
|
||||
}
|
||||
{ \
|
||||
Skein_Set_T0(ctxPtr, (T0)); \
|
||||
Skein_Set_T1(ctxPtr, (T1)); \
|
||||
}
|
||||
|
||||
#define Skein_Set_Type(ctxPtr, BLK_TYPE) \
|
||||
Skein_Set_T1(ctxPtr, SKEIN_T1_BLK_TYPE_##BLK_TYPE)
|
||||
Skein_Set_T1(ctxPtr, SKEIN_T1_BLK_TYPE_##BLK_TYPE)
|
||||
|
||||
/* set up for starting with a new type: h.T[0]=0; h.T[1] = NEW_TYPE; h.bCnt=0; */
|
||||
#define Skein_Start_New_Type(ctxPtr, BLK_TYPE) \
|
||||
{ Skein_Set_T0_T1(ctxPtr, 0, SKEIN_T1_FLAG_FIRST | SKEIN_T1_BLK_TYPE_##BLK_TYPE); (ctxPtr)->h.bCnt = 0; }
|
||||
{ Skein_Set_T0_T1(ctxPtr, 0, SKEIN_T1_FLAG_FIRST | SKEIN_T1_BLK_TYPE_##BLK_TYPE); (ctxPtr)->h.bCnt = 0; }
|
||||
|
||||
#define Skein_Clear_First_Flag(hdr) { (hdr).T[1] &= ~SKEIN_T1_FLAG_FIRST; }
|
||||
#define Skein_Set_Bit_Pad_Flag(hdr) { (hdr).T[1] |= SKEIN_T1_FLAG_BIT_PAD; }
|
||||
|
@ -270,37 +270,37 @@ int Skein1024_Output(struct skein1024_ctx *ctx, u8 *hashVal);
|
|||
** Skein block function constants (shared across Ref and Opt code)
|
||||
******************************************************************/
|
||||
enum
|
||||
{
|
||||
/* Skein_256 round rotation constants */
|
||||
R_256_0_0 = 14, R_256_0_1 = 16,
|
||||
R_256_1_0 = 52, R_256_1_1 = 57,
|
||||
R_256_2_0 = 23, R_256_2_1 = 40,
|
||||
R_256_3_0 = 5, R_256_3_1 = 37,
|
||||
R_256_4_0 = 25, R_256_4_1 = 33,
|
||||
R_256_5_0 = 46, R_256_5_1 = 12,
|
||||
R_256_6_0 = 58, R_256_6_1 = 22,
|
||||
R_256_7_0 = 32, R_256_7_1 = 32,
|
||||
{
|
||||
/* Skein_256 round rotation constants */
|
||||
R_256_0_0 = 14, R_256_0_1 = 16,
|
||||
R_256_1_0 = 52, R_256_1_1 = 57,
|
||||
R_256_2_0 = 23, R_256_2_1 = 40,
|
||||
R_256_3_0 = 5, R_256_3_1 = 37,
|
||||
R_256_4_0 = 25, R_256_4_1 = 33,
|
||||
R_256_5_0 = 46, R_256_5_1 = 12,
|
||||
R_256_6_0 = 58, R_256_6_1 = 22,
|
||||
R_256_7_0 = 32, R_256_7_1 = 32,
|
||||
|
||||
/* Skein_512 round rotation constants */
|
||||
R_512_0_0 = 46, R_512_0_1 = 36, R_512_0_2 = 19, R_512_0_3 = 37,
|
||||
R_512_1_0 = 33, R_512_1_1 = 27, R_512_1_2 = 14, R_512_1_3 = 42,
|
||||
R_512_2_0 = 17, R_512_2_1 = 49, R_512_2_2 = 36, R_512_2_3 = 39,
|
||||
R_512_3_0 = 44, R_512_3_1 = 9, R_512_3_2 = 54, R_512_3_3 = 56,
|
||||
R_512_4_0 = 39, R_512_4_1 = 30, R_512_4_2 = 34, R_512_4_3 = 24,
|
||||
R_512_5_0 = 13, R_512_5_1 = 50, R_512_5_2 = 10, R_512_5_3 = 17,
|
||||
R_512_6_0 = 25, R_512_6_1 = 29, R_512_6_2 = 39, R_512_6_3 = 43,
|
||||
R_512_7_0 = 8, R_512_7_1 = 35, R_512_7_2 = 56, R_512_7_3 = 22,
|
||||
/* Skein_512 round rotation constants */
|
||||
R_512_0_0 = 46, R_512_0_1 = 36, R_512_0_2 = 19, R_512_0_3 = 37,
|
||||
R_512_1_0 = 33, R_512_1_1 = 27, R_512_1_2 = 14, R_512_1_3 = 42,
|
||||
R_512_2_0 = 17, R_512_2_1 = 49, R_512_2_2 = 36, R_512_2_3 = 39,
|
||||
R_512_3_0 = 44, R_512_3_1 = 9, R_512_3_2 = 54, R_512_3_3 = 56,
|
||||
R_512_4_0 = 39, R_512_4_1 = 30, R_512_4_2 = 34, R_512_4_3 = 24,
|
||||
R_512_5_0 = 13, R_512_5_1 = 50, R_512_5_2 = 10, R_512_5_3 = 17,
|
||||
R_512_6_0 = 25, R_512_6_1 = 29, R_512_6_2 = 39, R_512_6_3 = 43,
|
||||
R_512_7_0 = 8, R_512_7_1 = 35, R_512_7_2 = 56, R_512_7_3 = 22,
|
||||
|
||||
/* Skein1024 round rotation constants */
|
||||
R1024_0_0 = 24, R1024_0_1 = 13, R1024_0_2 = 8, R1024_0_3 = 47, R1024_0_4 = 8, R1024_0_5 = 17, R1024_0_6 = 22, R1024_0_7 = 37,
|
||||
R1024_1_0 = 38, R1024_1_1 = 19, R1024_1_2 = 10, R1024_1_3 = 55, R1024_1_4 = 49, R1024_1_5 = 18, R1024_1_6 = 23, R1024_1_7 = 52,
|
||||
R1024_2_0 = 33, R1024_2_1 = 4, R1024_2_2 = 51, R1024_2_3 = 13, R1024_2_4 = 34, R1024_2_5 = 41, R1024_2_6 = 59, R1024_2_7 = 17,
|
||||
R1024_3_0 = 5, R1024_3_1 = 20, R1024_3_2 = 48, R1024_3_3 = 41, R1024_3_4 = 47, R1024_3_5 = 28, R1024_3_6 = 16, R1024_3_7 = 25,
|
||||
R1024_4_0 = 41, R1024_4_1 = 9, R1024_4_2 = 37, R1024_4_3 = 31, R1024_4_4 = 12, R1024_4_5 = 47, R1024_4_6 = 44, R1024_4_7 = 30,
|
||||
R1024_5_0 = 16, R1024_5_1 = 34, R1024_5_2 = 56, R1024_5_3 = 51, R1024_5_4 = 4, R1024_5_5 = 53, R1024_5_6 = 42, R1024_5_7 = 41,
|
||||
R1024_6_0 = 31, R1024_6_1 = 44, R1024_6_2 = 47, R1024_6_3 = 46, R1024_6_4 = 19, R1024_6_5 = 42, R1024_6_6 = 44, R1024_6_7 = 25,
|
||||
R1024_7_0 = 9, R1024_7_1 = 48, R1024_7_2 = 35, R1024_7_3 = 52, R1024_7_4 = 23, R1024_7_5 = 31, R1024_7_6 = 37, R1024_7_7 = 20
|
||||
};
|
||||
/* Skein1024 round rotation constants */
|
||||
R1024_0_0 = 24, R1024_0_1 = 13, R1024_0_2 = 8, R1024_0_3 = 47, R1024_0_4 = 8, R1024_0_5 = 17, R1024_0_6 = 22, R1024_0_7 = 37,
|
||||
R1024_1_0 = 38, R1024_1_1 = 19, R1024_1_2 = 10, R1024_1_3 = 55, R1024_1_4 = 49, R1024_1_5 = 18, R1024_1_6 = 23, R1024_1_7 = 52,
|
||||
R1024_2_0 = 33, R1024_2_1 = 4, R1024_2_2 = 51, R1024_2_3 = 13, R1024_2_4 = 34, R1024_2_5 = 41, R1024_2_6 = 59, R1024_2_7 = 17,
|
||||
R1024_3_0 = 5, R1024_3_1 = 20, R1024_3_2 = 48, R1024_3_3 = 41, R1024_3_4 = 47, R1024_3_5 = 28, R1024_3_6 = 16, R1024_3_7 = 25,
|
||||
R1024_4_0 = 41, R1024_4_1 = 9, R1024_4_2 = 37, R1024_4_3 = 31, R1024_4_4 = 12, R1024_4_5 = 47, R1024_4_6 = 44, R1024_4_7 = 30,
|
||||
R1024_5_0 = 16, R1024_5_1 = 34, R1024_5_2 = 56, R1024_5_3 = 51, R1024_5_4 = 4, R1024_5_5 = 53, R1024_5_6 = 42, R1024_5_7 = 41,
|
||||
R1024_6_0 = 31, R1024_6_1 = 44, R1024_6_2 = 47, R1024_6_3 = 46, R1024_6_4 = 19, R1024_6_5 = 42, R1024_6_6 = 44, R1024_6_7 = 25,
|
||||
R1024_7_0 = 9, R1024_7_1 = 48, R1024_7_2 = 35, R1024_7_3 = 52, R1024_7_4 = 23, R1024_7_5 = 31, R1024_7_6 = 37, R1024_7_7 = 20
|
||||
};
|
||||
|
||||
#ifndef SKEIN_ROUNDS
|
||||
#define SKEIN_256_ROUNDS_TOTAL (72) /* number of rounds for the different block sizes */
|
||||
|
|
|
@ -81,148 +81,148 @@ OTHER DEALINGS IN THE SOFTWARE.
|
|||
#include <linux/types.h>
|
||||
#include <skein.h>
|
||||
|
||||
/**
|
||||
* Which Skein size to use
|
||||
*/
|
||||
enum skein_size {
|
||||
Skein256 = 256, /*!< Skein with 256 bit state */
|
||||
Skein512 = 512, /*!< Skein with 512 bit state */
|
||||
Skein1024 = 1024 /*!< Skein with 1024 bit state */
|
||||
};
|
||||
/**
|
||||
* Which Skein size to use
|
||||
*/
|
||||
enum skein_size {
|
||||
Skein256 = 256, /*!< Skein with 256 bit state */
|
||||
Skein512 = 512, /*!< Skein with 512 bit state */
|
||||
Skein1024 = 1024 /*!< Skein with 1024 bit state */
|
||||
};
|
||||
|
||||
/**
|
||||
* Context for Skein.
|
||||
*
|
||||
* This structure was setup with some know-how of the internal
|
||||
* Skein structures, in particular ordering of header and size dependent
|
||||
* variables. If Skein implementation changes this, then adapt these
|
||||
* structures as well.
|
||||
*/
|
||||
struct skein_ctx {
|
||||
u64 skeinSize;
|
||||
u64 XSave[SKEIN_MAX_STATE_WORDS]; /* save area for state variables */
|
||||
union {
|
||||
struct skein_ctx_hdr h;
|
||||
struct skein_256_ctx s256;
|
||||
struct skein_512_ctx s512;
|
||||
struct skein1024_ctx s1024;
|
||||
} m;
|
||||
};
|
||||
/**
|
||||
* Context for Skein.
|
||||
*
|
||||
* This structure was setup with some know-how of the internal
|
||||
* Skein structures, in particular ordering of header and size dependent
|
||||
* variables. If Skein implementation changes this, then adapt these
|
||||
* structures as well.
|
||||
*/
|
||||
struct skein_ctx {
|
||||
u64 skeinSize;
|
||||
u64 XSave[SKEIN_MAX_STATE_WORDS]; /* save area for state variables */
|
||||
union {
|
||||
struct skein_ctx_hdr h;
|
||||
struct skein_256_ctx s256;
|
||||
struct skein_512_ctx s512;
|
||||
struct skein1024_ctx s1024;
|
||||
} m;
|
||||
};
|
||||
|
||||
/**
|
||||
* Prepare a Skein context.
|
||||
*
|
||||
* An application must call this function before it can use the Skein
|
||||
* context. The functions clears memory and initializes size dependent
|
||||
* variables.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to a Skein context.
|
||||
* @param size
|
||||
* Which Skein size to use.
|
||||
* @return
|
||||
* SKEIN_SUCESS of SKEIN_FAIL
|
||||
*/
|
||||
int skeinCtxPrepare(struct skein_ctx *ctx, enum skein_size size);
|
||||
/**
|
||||
* Prepare a Skein context.
|
||||
*
|
||||
* An application must call this function before it can use the Skein
|
||||
* context. The functions clears memory and initializes size dependent
|
||||
* variables.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to a Skein context.
|
||||
* @param size
|
||||
* Which Skein size to use.
|
||||
* @return
|
||||
* SKEIN_SUCESS of SKEIN_FAIL
|
||||
*/
|
||||
int skeinCtxPrepare(struct skein_ctx *ctx, enum skein_size size);
|
||||
|
||||
/**
|
||||
* Initialize a Skein context.
|
||||
*
|
||||
* Initializes the context with this data and saves the resulting Skein
|
||||
* state variables for further use.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to a Skein context.
|
||||
* @param hashBitLen
|
||||
* Number of MAC hash bits to compute
|
||||
* @return
|
||||
* SKEIN_SUCESS of SKEIN_FAIL
|
||||
* @see skeinReset
|
||||
*/
|
||||
int skeinInit(struct skein_ctx *ctx, size_t hashBitLen);
|
||||
/**
|
||||
* Initialize a Skein context.
|
||||
*
|
||||
* Initializes the context with this data and saves the resulting Skein
|
||||
* state variables for further use.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to a Skein context.
|
||||
* @param hashBitLen
|
||||
* Number of MAC hash bits to compute
|
||||
* @return
|
||||
* SKEIN_SUCESS of SKEIN_FAIL
|
||||
* @see skeinReset
|
||||
*/
|
||||
int skeinInit(struct skein_ctx *ctx, size_t hashBitLen);
|
||||
|
||||
/**
|
||||
* Resets a Skein context for further use.
|
||||
*
|
||||
* Restores the saved chaining variables to reset the Skein context.
|
||||
* Thus applications can reuse the same setup to process several
|
||||
* messages. This saves a complete Skein initialization cycle.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to a pre-initialized Skein MAC context
|
||||
*/
|
||||
void skeinReset(struct skein_ctx *ctx);
|
||||
|
||||
/**
|
||||
* Initializes a Skein context for MAC usage.
|
||||
*
|
||||
* Initializes the context with this data and saves the resulting Skein
|
||||
* state variables for further use.
|
||||
*
|
||||
* Applications call the normal Skein functions to update the MAC and
|
||||
* get the final result.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to an empty or preinitialized Skein MAC context
|
||||
* @param key
|
||||
* Pointer to key bytes or NULL
|
||||
* @param keyLen
|
||||
* Length of the key in bytes or zero
|
||||
* @param hashBitLen
|
||||
* Number of MAC hash bits to compute
|
||||
* @return
|
||||
* SKEIN_SUCESS of SKEIN_FAIL
|
||||
*/
|
||||
int skeinMacInit(struct skein_ctx *ctx, const u8 *key, size_t keyLen,
|
||||
size_t hashBitLen);
|
||||
/**
|
||||
* Resets a Skein context for further use.
|
||||
*
|
||||
* Restores the saved chaining variables to reset the Skein context.
|
||||
* Thus applications can reuse the same setup to process several
|
||||
* messages. This saves a complete Skein initialization cycle.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to a pre-initialized Skein MAC context
|
||||
*/
|
||||
void skeinReset(struct skein_ctx *ctx);
|
||||
|
||||
/**
|
||||
* Update Skein with the next part of the message.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to initialized Skein context
|
||||
* @param msg
|
||||
* Pointer to the message.
|
||||
* @param msgByteCnt
|
||||
* Length of the message in @b bytes
|
||||
* @return
|
||||
* Success or error code.
|
||||
*/
|
||||
int skeinUpdate(struct skein_ctx *ctx, const u8 *msg,
|
||||
size_t msgByteCnt);
|
||||
/**
|
||||
* Initializes a Skein context for MAC usage.
|
||||
*
|
||||
* Initializes the context with this data and saves the resulting Skein
|
||||
* state variables for further use.
|
||||
*
|
||||
* Applications call the normal Skein functions to update the MAC and
|
||||
* get the final result.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to an empty or preinitialized Skein MAC context
|
||||
* @param key
|
||||
* Pointer to key bytes or NULL
|
||||
* @param keyLen
|
||||
* Length of the key in bytes or zero
|
||||
* @param hashBitLen
|
||||
* Number of MAC hash bits to compute
|
||||
* @return
|
||||
* SKEIN_SUCESS of SKEIN_FAIL
|
||||
*/
|
||||
int skeinMacInit(struct skein_ctx *ctx, const u8 *key, size_t keyLen,
|
||||
size_t hashBitLen);
|
||||
|
||||
/**
|
||||
* Update the hash with a message bit string.
|
||||
*
|
||||
* Skein can handle data not only as bytes but also as bit strings of
|
||||
* arbitrary length (up to its maximum design size).
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to initialized Skein context
|
||||
* @param msg
|
||||
* Pointer to the message.
|
||||
* @param msgBitCnt
|
||||
* Length of the message in @b bits.
|
||||
*/
|
||||
int skeinUpdateBits(struct skein_ctx *ctx, const u8 *msg,
|
||||
size_t msgBitCnt);
|
||||
/**
|
||||
* Update Skein with the next part of the message.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to initialized Skein context
|
||||
* @param msg
|
||||
* Pointer to the message.
|
||||
* @param msgByteCnt
|
||||
* Length of the message in @b bytes
|
||||
* @return
|
||||
* Success or error code.
|
||||
*/
|
||||
int skeinUpdate(struct skein_ctx *ctx, const u8 *msg,
|
||||
size_t msgByteCnt);
|
||||
|
||||
/**
|
||||
* Finalize Skein and return the hash.
|
||||
*
|
||||
* Before an application can reuse a Skein setup the application must
|
||||
* reset the Skein context.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to initialized Skein context
|
||||
* @param hash
|
||||
* Pointer to buffer that receives the hash. The buffer must be large
|
||||
* enough to store @c hashBitLen bits.
|
||||
* @return
|
||||
* Success or error code.
|
||||
* @see skeinReset
|
||||
*/
|
||||
int skeinFinal(struct skein_ctx *ctx, u8 *hash);
|
||||
/**
|
||||
* Update the hash with a message bit string.
|
||||
*
|
||||
* Skein can handle data not only as bytes but also as bit strings of
|
||||
* arbitrary length (up to its maximum design size).
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to initialized Skein context
|
||||
* @param msg
|
||||
* Pointer to the message.
|
||||
* @param msgBitCnt
|
||||
* Length of the message in @b bits.
|
||||
*/
|
||||
int skeinUpdateBits(struct skein_ctx *ctx, const u8 *msg,
|
||||
size_t msgBitCnt);
|
||||
|
||||
/**
|
||||
* Finalize Skein and return the hash.
|
||||
*
|
||||
* Before an application can reuse a Skein setup the application must
|
||||
* reset the Skein context.
|
||||
*
|
||||
* @param ctx
|
||||
* Pointer to initialized Skein context
|
||||
* @param hash
|
||||
* Pointer to buffer that receives the hash. The buffer must be large
|
||||
* enough to store @c hashBitLen bits.
|
||||
* @return
|
||||
* Success or error code.
|
||||
* @see skeinReset
|
||||
*/
|
||||
int skeinFinal(struct skein_ctx *ctx, u8 *hash);
|
||||
|
||||
/**
|
||||
* @}
|
||||
|
|
|
@ -21,179 +21,179 @@
|
|||
|
||||
/* blkSize = 256 bits. hashSize = 128 bits */
|
||||
const u64 SKEIN_256_IV_128[] =
|
||||
{
|
||||
MK_64(0xE1111906, 0x964D7260),
|
||||
MK_64(0x883DAAA7, 0x7C8D811C),
|
||||
MK_64(0x10080DF4, 0x91960F7A),
|
||||
MK_64(0xCCF7DDE5, 0xB45BC1C2)
|
||||
};
|
||||
{
|
||||
MK_64(0xE1111906, 0x964D7260),
|
||||
MK_64(0x883DAAA7, 0x7C8D811C),
|
||||
MK_64(0x10080DF4, 0x91960F7A),
|
||||
MK_64(0xCCF7DDE5, 0xB45BC1C2)
|
||||
};
|
||||
|
||||
/* blkSize = 256 bits. hashSize = 160 bits */
|
||||
const u64 SKEIN_256_IV_160[] =
|
||||
{
|
||||
MK_64(0x14202314, 0x72825E98),
|
||||
MK_64(0x2AC4E9A2, 0x5A77E590),
|
||||
MK_64(0xD47A5856, 0x8838D63E),
|
||||
MK_64(0x2DD2E496, 0x8586AB7D)
|
||||
};
|
||||
{
|
||||
MK_64(0x14202314, 0x72825E98),
|
||||
MK_64(0x2AC4E9A2, 0x5A77E590),
|
||||
MK_64(0xD47A5856, 0x8838D63E),
|
||||
MK_64(0x2DD2E496, 0x8586AB7D)
|
||||
};
|
||||
|
||||
/* blkSize = 256 bits. hashSize = 224 bits */
|
||||
const u64 SKEIN_256_IV_224[] =
|
||||
{
|
||||
MK_64(0xC6098A8C, 0x9AE5EA0B),
|
||||
MK_64(0x876D5686, 0x08C5191C),
|
||||
MK_64(0x99CB88D7, 0xD7F53884),
|
||||
MK_64(0x384BDDB1, 0xAEDDB5DE)
|
||||
};
|
||||
{
|
||||
MK_64(0xC6098A8C, 0x9AE5EA0B),
|
||||
MK_64(0x876D5686, 0x08C5191C),
|
||||
MK_64(0x99CB88D7, 0xD7F53884),
|
||||
MK_64(0x384BDDB1, 0xAEDDB5DE)
|
||||
};
|
||||
|
||||
/* blkSize = 256 bits. hashSize = 256 bits */
|
||||
const u64 SKEIN_256_IV_256[] =
|
||||
{
|
||||
MK_64(0xFC9DA860, 0xD048B449),
|
||||
MK_64(0x2FCA6647, 0x9FA7D833),
|
||||
MK_64(0xB33BC389, 0x6656840F),
|
||||
MK_64(0x6A54E920, 0xFDE8DA69)
|
||||
};
|
||||
{
|
||||
MK_64(0xFC9DA860, 0xD048B449),
|
||||
MK_64(0x2FCA6647, 0x9FA7D833),
|
||||
MK_64(0xB33BC389, 0x6656840F),
|
||||
MK_64(0x6A54E920, 0xFDE8DA69)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 128 bits */
|
||||
const u64 SKEIN_512_IV_128[] =
|
||||
{
|
||||
MK_64(0xA8BC7BF3, 0x6FBF9F52),
|
||||
MK_64(0x1E9872CE, 0xBD1AF0AA),
|
||||
MK_64(0x309B1790, 0xB32190D3),
|
||||
MK_64(0xBCFBB854, 0x3F94805C),
|
||||
MK_64(0x0DA61BCD, 0x6E31B11B),
|
||||
MK_64(0x1A18EBEA, 0xD46A32E3),
|
||||
MK_64(0xA2CC5B18, 0xCE84AA82),
|
||||
MK_64(0x6982AB28, 0x9D46982D)
|
||||
};
|
||||
{
|
||||
MK_64(0xA8BC7BF3, 0x6FBF9F52),
|
||||
MK_64(0x1E9872CE, 0xBD1AF0AA),
|
||||
MK_64(0x309B1790, 0xB32190D3),
|
||||
MK_64(0xBCFBB854, 0x3F94805C),
|
||||
MK_64(0x0DA61BCD, 0x6E31B11B),
|
||||
MK_64(0x1A18EBEA, 0xD46A32E3),
|
||||
MK_64(0xA2CC5B18, 0xCE84AA82),
|
||||
MK_64(0x6982AB28, 0x9D46982D)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 160 bits */
|
||||
const u64 SKEIN_512_IV_160[] =
|
||||
{
|
||||
MK_64(0x28B81A2A, 0xE013BD91),
|
||||
MK_64(0xC2F11668, 0xB5BDF78F),
|
||||
MK_64(0x1760D8F3, 0xF6A56F12),
|
||||
MK_64(0x4FB74758, 0x8239904F),
|
||||
MK_64(0x21EDE07F, 0x7EAF5056),
|
||||
MK_64(0xD908922E, 0x63ED70B8),
|
||||
MK_64(0xB8EC76FF, 0xECCB52FA),
|
||||
MK_64(0x01A47BB8, 0xA3F27A6E)
|
||||
};
|
||||
{
|
||||
MK_64(0x28B81A2A, 0xE013BD91),
|
||||
MK_64(0xC2F11668, 0xB5BDF78F),
|
||||
MK_64(0x1760D8F3, 0xF6A56F12),
|
||||
MK_64(0x4FB74758, 0x8239904F),
|
||||
MK_64(0x21EDE07F, 0x7EAF5056),
|
||||
MK_64(0xD908922E, 0x63ED70B8),
|
||||
MK_64(0xB8EC76FF, 0xECCB52FA),
|
||||
MK_64(0x01A47BB8, 0xA3F27A6E)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 224 bits */
|
||||
const u64 SKEIN_512_IV_224[] =
|
||||
{
|
||||
MK_64(0xCCD06162, 0x48677224),
|
||||
MK_64(0xCBA65CF3, 0xA92339EF),
|
||||
MK_64(0x8CCD69D6, 0x52FF4B64),
|
||||
MK_64(0x398AED7B, 0x3AB890B4),
|
||||
MK_64(0x0F59D1B1, 0x457D2BD0),
|
||||
MK_64(0x6776FE65, 0x75D4EB3D),
|
||||
MK_64(0x99FBC70E, 0x997413E9),
|
||||
MK_64(0x9E2CFCCF, 0xE1C41EF7)
|
||||
};
|
||||
{
|
||||
MK_64(0xCCD06162, 0x48677224),
|
||||
MK_64(0xCBA65CF3, 0xA92339EF),
|
||||
MK_64(0x8CCD69D6, 0x52FF4B64),
|
||||
MK_64(0x398AED7B, 0x3AB890B4),
|
||||
MK_64(0x0F59D1B1, 0x457D2BD0),
|
||||
MK_64(0x6776FE65, 0x75D4EB3D),
|
||||
MK_64(0x99FBC70E, 0x997413E9),
|
||||
MK_64(0x9E2CFCCF, 0xE1C41EF7)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 256 bits */
|
||||
const u64 SKEIN_512_IV_256[] =
|
||||
{
|
||||
MK_64(0xCCD044A1, 0x2FDB3E13),
|
||||
MK_64(0xE8359030, 0x1A79A9EB),
|
||||
MK_64(0x55AEA061, 0x4F816E6F),
|
||||
MK_64(0x2A2767A4, 0xAE9B94DB),
|
||||
MK_64(0xEC06025E, 0x74DD7683),
|
||||
MK_64(0xE7A436CD, 0xC4746251),
|
||||
MK_64(0xC36FBAF9, 0x393AD185),
|
||||
MK_64(0x3EEDBA18, 0x33EDFC13)
|
||||
};
|
||||
{
|
||||
MK_64(0xCCD044A1, 0x2FDB3E13),
|
||||
MK_64(0xE8359030, 0x1A79A9EB),
|
||||
MK_64(0x55AEA061, 0x4F816E6F),
|
||||
MK_64(0x2A2767A4, 0xAE9B94DB),
|
||||
MK_64(0xEC06025E, 0x74DD7683),
|
||||
MK_64(0xE7A436CD, 0xC4746251),
|
||||
MK_64(0xC36FBAF9, 0x393AD185),
|
||||
MK_64(0x3EEDBA18, 0x33EDFC13)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 384 bits */
|
||||
const u64 SKEIN_512_IV_384[] =
|
||||
{
|
||||
MK_64(0xA3F6C6BF, 0x3A75EF5F),
|
||||
MK_64(0xB0FEF9CC, 0xFD84FAA4),
|
||||
MK_64(0x9D77DD66, 0x3D770CFE),
|
||||
MK_64(0xD798CBF3, 0xB468FDDA),
|
||||
MK_64(0x1BC4A666, 0x8A0E4465),
|
||||
MK_64(0x7ED7D434, 0xE5807407),
|
||||
MK_64(0x548FC1AC, 0xD4EC44D6),
|
||||
MK_64(0x266E1754, 0x6AA18FF8)
|
||||
};
|
||||
{
|
||||
MK_64(0xA3F6C6BF, 0x3A75EF5F),
|
||||
MK_64(0xB0FEF9CC, 0xFD84FAA4),
|
||||
MK_64(0x9D77DD66, 0x3D770CFE),
|
||||
MK_64(0xD798CBF3, 0xB468FDDA),
|
||||
MK_64(0x1BC4A666, 0x8A0E4465),
|
||||
MK_64(0x7ED7D434, 0xE5807407),
|
||||
MK_64(0x548FC1AC, 0xD4EC44D6),
|
||||
MK_64(0x266E1754, 0x6AA18FF8)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 512 bits */
|
||||
const u64 SKEIN_512_IV_512[] =
|
||||
{
|
||||
MK_64(0x4903ADFF, 0x749C51CE),
|
||||
MK_64(0x0D95DE39, 0x9746DF03),
|
||||
MK_64(0x8FD19341, 0x27C79BCE),
|
||||
MK_64(0x9A255629, 0xFF352CB1),
|
||||
MK_64(0x5DB62599, 0xDF6CA7B0),
|
||||
MK_64(0xEABE394C, 0xA9D5C3F4),
|
||||
MK_64(0x991112C7, 0x1A75B523),
|
||||
MK_64(0xAE18A40B, 0x660FCC33)
|
||||
};
|
||||
{
|
||||
MK_64(0x4903ADFF, 0x749C51CE),
|
||||
MK_64(0x0D95DE39, 0x9746DF03),
|
||||
MK_64(0x8FD19341, 0x27C79BCE),
|
||||
MK_64(0x9A255629, 0xFF352CB1),
|
||||
MK_64(0x5DB62599, 0xDF6CA7B0),
|
||||
MK_64(0xEABE394C, 0xA9D5C3F4),
|
||||
MK_64(0x991112C7, 0x1A75B523),
|
||||
MK_64(0xAE18A40B, 0x660FCC33)
|
||||
};
|
||||
|
||||
/* blkSize = 1024 bits. hashSize = 384 bits */
|
||||
const u64 SKEIN1024_IV_384[] =
|
||||
{
|
||||
MK_64(0x5102B6B8, 0xC1894A35),
|
||||
MK_64(0xFEEBC9E3, 0xFE8AF11A),
|
||||
MK_64(0x0C807F06, 0xE32BED71),
|
||||
MK_64(0x60C13A52, 0xB41A91F6),
|
||||
MK_64(0x9716D35D, 0xD4917C38),
|
||||
MK_64(0xE780DF12, 0x6FD31D3A),
|
||||
MK_64(0x797846B6, 0xC898303A),
|
||||
MK_64(0xB172C2A8, 0xB3572A3B),
|
||||
MK_64(0xC9BC8203, 0xA6104A6C),
|
||||
MK_64(0x65909338, 0xD75624F4),
|
||||
MK_64(0x94BCC568, 0x4B3F81A0),
|
||||
MK_64(0x3EBBF51E, 0x10ECFD46),
|
||||
MK_64(0x2DF50F0B, 0xEEB08542),
|
||||
MK_64(0x3B5A6530, 0x0DBC6516),
|
||||
MK_64(0x484B9CD2, 0x167BBCE1),
|
||||
MK_64(0x2D136947, 0xD4CBAFEA)
|
||||
};
|
||||
{
|
||||
MK_64(0x5102B6B8, 0xC1894A35),
|
||||
MK_64(0xFEEBC9E3, 0xFE8AF11A),
|
||||
MK_64(0x0C807F06, 0xE32BED71),
|
||||
MK_64(0x60C13A52, 0xB41A91F6),
|
||||
MK_64(0x9716D35D, 0xD4917C38),
|
||||
MK_64(0xE780DF12, 0x6FD31D3A),
|
||||
MK_64(0x797846B6, 0xC898303A),
|
||||
MK_64(0xB172C2A8, 0xB3572A3B),
|
||||
MK_64(0xC9BC8203, 0xA6104A6C),
|
||||
MK_64(0x65909338, 0xD75624F4),
|
||||
MK_64(0x94BCC568, 0x4B3F81A0),
|
||||
MK_64(0x3EBBF51E, 0x10ECFD46),
|
||||
MK_64(0x2DF50F0B, 0xEEB08542),
|
||||
MK_64(0x3B5A6530, 0x0DBC6516),
|
||||
MK_64(0x484B9CD2, 0x167BBCE1),
|
||||
MK_64(0x2D136947, 0xD4CBAFEA)
|
||||
};
|
||||
|
||||
/* blkSize = 1024 bits. hashSize = 512 bits */
|
||||
const u64 SKEIN1024_IV_512[] =
|
||||
{
|
||||
MK_64(0xCAEC0E5D, 0x7C1B1B18),
|
||||
MK_64(0xA01B0E04, 0x5F03E802),
|
||||
MK_64(0x33840451, 0xED912885),
|
||||
MK_64(0x374AFB04, 0xEAEC2E1C),
|
||||
MK_64(0xDF25A0E2, 0x813581F7),
|
||||
MK_64(0xE4004093, 0x8B12F9D2),
|
||||
MK_64(0xA662D539, 0xC2ED39B6),
|
||||
MK_64(0xFA8B85CF, 0x45D8C75A),
|
||||
MK_64(0x8316ED8E, 0x29EDE796),
|
||||
MK_64(0x053289C0, 0x2E9F91B8),
|
||||
MK_64(0xC3F8EF1D, 0x6D518B73),
|
||||
MK_64(0xBDCEC3C4, 0xD5EF332E),
|
||||
MK_64(0x549A7E52, 0x22974487),
|
||||
MK_64(0x67070872, 0x5B749816),
|
||||
MK_64(0xB9CD28FB, 0xF0581BD1),
|
||||
MK_64(0x0E2940B8, 0x15804974)
|
||||
};
|
||||
{
|
||||
MK_64(0xCAEC0E5D, 0x7C1B1B18),
|
||||
MK_64(0xA01B0E04, 0x5F03E802),
|
||||
MK_64(0x33840451, 0xED912885),
|
||||
MK_64(0x374AFB04, 0xEAEC2E1C),
|
||||
MK_64(0xDF25A0E2, 0x813581F7),
|
||||
MK_64(0xE4004093, 0x8B12F9D2),
|
||||
MK_64(0xA662D539, 0xC2ED39B6),
|
||||
MK_64(0xFA8B85CF, 0x45D8C75A),
|
||||
MK_64(0x8316ED8E, 0x29EDE796),
|
||||
MK_64(0x053289C0, 0x2E9F91B8),
|
||||
MK_64(0xC3F8EF1D, 0x6D518B73),
|
||||
MK_64(0xBDCEC3C4, 0xD5EF332E),
|
||||
MK_64(0x549A7E52, 0x22974487),
|
||||
MK_64(0x67070872, 0x5B749816),
|
||||
MK_64(0xB9CD28FB, 0xF0581BD1),
|
||||
MK_64(0x0E2940B8, 0x15804974)
|
||||
};
|
||||
|
||||
/* blkSize = 1024 bits. hashSize = 1024 bits */
|
||||
const u64 SKEIN1024_IV_1024[] =
|
||||
{
|
||||
MK_64(0xD593DA07, 0x41E72355),
|
||||
MK_64(0x15B5E511, 0xAC73E00C),
|
||||
MK_64(0x5180E5AE, 0xBAF2C4F0),
|
||||
MK_64(0x03BD41D3, 0xFCBCAFAF),
|
||||
MK_64(0x1CAEC6FD, 0x1983A898),
|
||||
MK_64(0x6E510B8B, 0xCDD0589F),
|
||||
MK_64(0x77E2BDFD, 0xC6394ADA),
|
||||
MK_64(0xC11E1DB5, 0x24DCB0A3),
|
||||
MK_64(0xD6D14AF9, 0xC6329AB5),
|
||||
MK_64(0x6A9B0BFC, 0x6EB67E0D),
|
||||
MK_64(0x9243C60D, 0xCCFF1332),
|
||||
MK_64(0x1A1F1DDE, 0x743F02D4),
|
||||
MK_64(0x0996753C, 0x10ED0BB8),
|
||||
MK_64(0x6572DD22, 0xF2B4969A),
|
||||
MK_64(0x61FD3062, 0xD00A579A),
|
||||
MK_64(0x1DE0536E, 0x8682E539)
|
||||
};
|
||||
{
|
||||
MK_64(0xD593DA07, 0x41E72355),
|
||||
MK_64(0x15B5E511, 0xAC73E00C),
|
||||
MK_64(0x5180E5AE, 0xBAF2C4F0),
|
||||
MK_64(0x03BD41D3, 0xFCBCAFAF),
|
||||
MK_64(0x1CAEC6FD, 0x1983A898),
|
||||
MK_64(0x6E510B8B, 0xCDD0589F),
|
||||
MK_64(0x77E2BDFD, 0xC6394ADA),
|
||||
MK_64(0xC11E1DB5, 0x24DCB0A3),
|
||||
MK_64(0xD6D14AF9, 0xC6329AB5),
|
||||
MK_64(0x6A9B0BFC, 0x6EB67E0D),
|
||||
MK_64(0x9243C60D, 0xCCFF1332),
|
||||
MK_64(0x1A1F1DDE, 0x743F02D4),
|
||||
MK_64(0x0996753C, 0x10ED0BB8),
|
||||
MK_64(0x6572DD22, 0xF2B4969A),
|
||||
MK_64(0x61FD3062, 0xD00A579A),
|
||||
MK_64(0x1DE0536E, 0x8682E539)
|
||||
};
|
||||
|
||||
#endif /* _SKEIN_IV_H_ */
|
||||
|
|
|
@ -33,125 +33,125 @@
|
|||
|
||||
#define KeyScheduleConst 0x1BD11BDAA9FC1A22L
|
||||
|
||||
/**
|
||||
* Which Threefish size to use
|
||||
*/
|
||||
enum threefish_size {
|
||||
Threefish256 = 256, /*!< Skein with 256 bit state */
|
||||
Threefish512 = 512, /*!< Skein with 512 bit state */
|
||||
Threefish1024 = 1024 /*!< Skein with 1024 bit state */
|
||||
};
|
||||
|
||||
/**
|
||||
* Context for Threefish key and tweak words.
|
||||
*
|
||||
* This structure was setup with some know-how of the internal
|
||||
* Skein structures, in particular ordering of header and size dependent
|
||||
* variables. If Skein implementation changes this, the adapt these
|
||||
* structures as well.
|
||||
*/
|
||||
struct threefish_key {
|
||||
u64 stateSize;
|
||||
u64 key[SKEIN_MAX_STATE_WORDS+1]; /* max number of key words*/
|
||||
u64 tweak[3];
|
||||
};
|
||||
/**
|
||||
* Which Threefish size to use
|
||||
*/
|
||||
enum threefish_size {
|
||||
Threefish256 = 256, /*!< Skein with 256 bit state */
|
||||
Threefish512 = 512, /*!< Skein with 512 bit state */
|
||||
Threefish1024 = 1024 /*!< Skein with 1024 bit state */
|
||||
};
|
||||
|
||||
/**
|
||||
* Set Threefish key and tweak data.
|
||||
*
|
||||
* This function sets the key and tweak data for the Threefish cipher of
|
||||
* the given size. The key data must have the same length (number of bits)
|
||||
* as the state size
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param size
|
||||
* Which Skein size to use.
|
||||
* @param keyData
|
||||
* Pointer to the key words (word has 64 bits).
|
||||
* @param tweak
|
||||
* Pointer to the two tweak words (word has 64 bits).
|
||||
*/
|
||||
void threefishSetKey(struct threefish_key *keyCtx, enum threefish_size stateSize, u64 *keyData, u64 *tweak);
|
||||
|
||||
/**
|
||||
* Encrypt Threefisch block (bytes).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, encrypts them and stores the result in the output
|
||||
* buffer.
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to plaintext data buffer.
|
||||
* @param out
|
||||
* Pointer to cipher buffer.
|
||||
*/
|
||||
void threefishEncryptBlockBytes(struct threefish_key *keyCtx, u8 *in, u8 *out);
|
||||
|
||||
/**
|
||||
* Encrypt Threefisch block (words).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, encrypts them and stores the result in the output
|
||||
* buffer.
|
||||
*
|
||||
* The wordsize ist set to 64 bits.
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to plaintext data buffer.
|
||||
* @param out
|
||||
* Pointer to cipher buffer.
|
||||
*/
|
||||
void threefishEncryptBlockWords(struct threefish_key *keyCtx, u64 *in, u64 *out);
|
||||
/**
|
||||
* Context for Threefish key and tweak words.
|
||||
*
|
||||
* This structure was setup with some know-how of the internal
|
||||
* Skein structures, in particular ordering of header and size dependent
|
||||
* variables. If Skein implementation changes this, the adapt these
|
||||
* structures as well.
|
||||
*/
|
||||
struct threefish_key {
|
||||
u64 stateSize;
|
||||
u64 key[SKEIN_MAX_STATE_WORDS+1]; /* max number of key words*/
|
||||
u64 tweak[3];
|
||||
};
|
||||
|
||||
/**
|
||||
* Decrypt Threefisch block (bytes).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, decrypts them and stores the result in the output
|
||||
* buffer
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to cipher data buffer.
|
||||
* @param out
|
||||
* Pointer to plaintext buffer.
|
||||
*/
|
||||
void threefishDecryptBlockBytes(struct threefish_key *keyCtx, u8 *in, u8 *out);
|
||||
/**
|
||||
* Set Threefish key and tweak data.
|
||||
*
|
||||
* This function sets the key and tweak data for the Threefish cipher of
|
||||
* the given size. The key data must have the same length (number of bits)
|
||||
* as the state size
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param size
|
||||
* Which Skein size to use.
|
||||
* @param keyData
|
||||
* Pointer to the key words (word has 64 bits).
|
||||
* @param tweak
|
||||
* Pointer to the two tweak words (word has 64 bits).
|
||||
*/
|
||||
void threefishSetKey(struct threefish_key *keyCtx, enum threefish_size stateSize, u64 *keyData, u64 *tweak);
|
||||
|
||||
/**
|
||||
* Decrypt Threefisch block (words).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, encrypts them and stores the result in the output
|
||||
* buffer.
|
||||
*
|
||||
* The wordsize ist set to 64 bits.
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to cipher data buffer.
|
||||
* @param out
|
||||
* Pointer to plaintext buffer.
|
||||
*/
|
||||
void threefishDecryptBlockWords(struct threefish_key *keyCtx, u64 *in, u64 *out);
|
||||
/**
|
||||
* Encrypt Threefisch block (bytes).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, encrypts them and stores the result in the output
|
||||
* buffer.
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to plaintext data buffer.
|
||||
* @param out
|
||||
* Pointer to cipher buffer.
|
||||
*/
|
||||
void threefishEncryptBlockBytes(struct threefish_key *keyCtx, u8 *in, u8 *out);
|
||||
|
||||
void threefishEncrypt256(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishEncrypt512(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishEncrypt1024(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishDecrypt256(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishDecrypt512(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishDecrypt1024(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
/**
|
||||
* Encrypt Threefisch block (words).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, encrypts them and stores the result in the output
|
||||
* buffer.
|
||||
*
|
||||
* The wordsize ist set to 64 bits.
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to plaintext data buffer.
|
||||
* @param out
|
||||
* Pointer to cipher buffer.
|
||||
*/
|
||||
void threefishEncryptBlockWords(struct threefish_key *keyCtx, u64 *in, u64 *out);
|
||||
|
||||
/**
|
||||
* Decrypt Threefisch block (bytes).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, decrypts them and stores the result in the output
|
||||
* buffer
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to cipher data buffer.
|
||||
* @param out
|
||||
* Pointer to plaintext buffer.
|
||||
*/
|
||||
void threefishDecryptBlockBytes(struct threefish_key *keyCtx, u8 *in, u8 *out);
|
||||
|
||||
/**
|
||||
* Decrypt Threefisch block (words).
|
||||
*
|
||||
* The buffer must have at least the same length (number of bits) aas the
|
||||
* state size for this key. The function uses the first @c stateSize bits
|
||||
* of the input buffer, encrypts them and stores the result in the output
|
||||
* buffer.
|
||||
*
|
||||
* The wordsize ist set to 64 bits.
|
||||
*
|
||||
* @param keyCtx
|
||||
* Pointer to a Threefish key structure.
|
||||
* @param in
|
||||
* Poionter to cipher data buffer.
|
||||
* @param out
|
||||
* Pointer to plaintext buffer.
|
||||
*/
|
||||
void threefishDecryptBlockWords(struct threefish_key *keyCtx, u64 *in, u64 *out);
|
||||
|
||||
void threefishEncrypt256(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishEncrypt512(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishEncrypt1024(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishDecrypt256(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishDecrypt512(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
void threefishDecrypt1024(struct threefish_key *keyCtx, u64 *input, u64 *output);
|
||||
/**
|
||||
* @}
|
||||
*/
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -29,191 +29,191 @@ OTHER DEALINGS IN THE SOFTWARE.
|
|||
|
||||
int skeinCtxPrepare(struct skein_ctx *ctx, enum skein_size size)
|
||||
{
|
||||
Skein_Assert(ctx && size, SKEIN_FAIL);
|
||||
Skein_Assert(ctx && size, SKEIN_FAIL);
|
||||
|
||||
memset(ctx , 0, sizeof(struct skein_ctx));
|
||||
ctx->skeinSize = size;
|
||||
memset(ctx , 0, sizeof(struct skein_ctx));
|
||||
ctx->skeinSize = size;
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
int skeinInit(struct skein_ctx *ctx, size_t hashBitLen)
|
||||
{
|
||||
int ret = SKEIN_FAIL;
|
||||
size_t Xlen = 0;
|
||||
u64 *X = NULL;
|
||||
u64 treeInfo = SKEIN_CFG_TREE_INFO_SEQUENTIAL;
|
||||
int ret = SKEIN_FAIL;
|
||||
size_t Xlen = 0;
|
||||
u64 *X = NULL;
|
||||
u64 treeInfo = SKEIN_CFG_TREE_INFO_SEQUENTIAL;
|
||||
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
/*
|
||||
* The following two lines rely of the fact that the real Skein contexts are
|
||||
* a union in out context and thus have tha maximum memory available.
|
||||
* The beauty of C :-) .
|
||||
*/
|
||||
X = ctx->m.s256.X;
|
||||
Xlen = ctx->skeinSize/8;
|
||||
/*
|
||||
* If size is the same and hash bit length is zero then reuse
|
||||
* the save chaining variables.
|
||||
*/
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_InitExt(&ctx->m.s256, hashBitLen,
|
||||
treeInfo, NULL, 0);
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_InitExt(&ctx->m.s512, hashBitLen,
|
||||
treeInfo, NULL, 0);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_InitExt(&ctx->m.s1024, hashBitLen,
|
||||
treeInfo, NULL, 0);
|
||||
break;
|
||||
}
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
/*
|
||||
* The following two lines rely of the fact that the real Skein contexts are
|
||||
* a union in out context and thus have tha maximum memory available.
|
||||
* The beauty of C :-) .
|
||||
*/
|
||||
X = ctx->m.s256.X;
|
||||
Xlen = ctx->skeinSize/8;
|
||||
/*
|
||||
* If size is the same and hash bit length is zero then reuse
|
||||
* the save chaining variables.
|
||||
*/
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_InitExt(&ctx->m.s256, hashBitLen,
|
||||
treeInfo, NULL, 0);
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_InitExt(&ctx->m.s512, hashBitLen,
|
||||
treeInfo, NULL, 0);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_InitExt(&ctx->m.s1024, hashBitLen,
|
||||
treeInfo, NULL, 0);
|
||||
break;
|
||||
}
|
||||
|
||||
if (ret == SKEIN_SUCCESS) {
|
||||
/* Save chaining variables for this combination of size and hashBitLen */
|
||||
memcpy(ctx->XSave, X, Xlen);
|
||||
}
|
||||
return ret;
|
||||
if (ret == SKEIN_SUCCESS) {
|
||||
/* Save chaining variables for this combination of size and hashBitLen */
|
||||
memcpy(ctx->XSave, X, Xlen);
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
int skeinMacInit(struct skein_ctx *ctx, const u8 *key, size_t keyLen,
|
||||
size_t hashBitLen)
|
||||
size_t hashBitLen)
|
||||
{
|
||||
int ret = SKEIN_FAIL;
|
||||
u64 *X = NULL;
|
||||
size_t Xlen = 0;
|
||||
u64 treeInfo = SKEIN_CFG_TREE_INFO_SEQUENTIAL;
|
||||
int ret = SKEIN_FAIL;
|
||||
u64 *X = NULL;
|
||||
size_t Xlen = 0;
|
||||
u64 treeInfo = SKEIN_CFG_TREE_INFO_SEQUENTIAL;
|
||||
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
|
||||
X = ctx->m.s256.X;
|
||||
Xlen = ctx->skeinSize/8;
|
||||
X = ctx->m.s256.X;
|
||||
Xlen = ctx->skeinSize/8;
|
||||
|
||||
Skein_Assert(hashBitLen, SKEIN_BAD_HASHLEN);
|
||||
Skein_Assert(hashBitLen, SKEIN_BAD_HASHLEN);
|
||||
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_InitExt(&ctx->m.s256, hashBitLen,
|
||||
treeInfo,
|
||||
(const u8 *)key, keyLen);
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_InitExt(&ctx->m.s256, hashBitLen,
|
||||
treeInfo,
|
||||
(const u8 *)key, keyLen);
|
||||
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_InitExt(&ctx->m.s512, hashBitLen,
|
||||
treeInfo,
|
||||
(const u8 *)key, keyLen);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_InitExt(&ctx->m.s1024, hashBitLen,
|
||||
treeInfo,
|
||||
(const u8 *)key, keyLen);
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_InitExt(&ctx->m.s512, hashBitLen,
|
||||
treeInfo,
|
||||
(const u8 *)key, keyLen);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_InitExt(&ctx->m.s1024, hashBitLen,
|
||||
treeInfo,
|
||||
(const u8 *)key, keyLen);
|
||||
|
||||
break;
|
||||
}
|
||||
if (ret == SKEIN_SUCCESS) {
|
||||
/* Save chaining variables for this combination of key, keyLen, hashBitLen */
|
||||
memcpy(ctx->XSave, X, Xlen);
|
||||
}
|
||||
return ret;
|
||||
break;
|
||||
}
|
||||
if (ret == SKEIN_SUCCESS) {
|
||||
/* Save chaining variables for this combination of key, keyLen, hashBitLen */
|
||||
memcpy(ctx->XSave, X, Xlen);
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
||||
void skeinReset(struct skein_ctx *ctx)
|
||||
{
|
||||
size_t Xlen = 0;
|
||||
u64 *X = NULL;
|
||||
size_t Xlen = 0;
|
||||
u64 *X = NULL;
|
||||
|
||||
/*
|
||||
* The following two lines rely of the fact that the real Skein contexts are
|
||||
* a union in out context and thus have tha maximum memory available.
|
||||
* The beautiy of C :-) .
|
||||
*/
|
||||
X = ctx->m.s256.X;
|
||||
Xlen = ctx->skeinSize/8;
|
||||
/* Restore the chaing variable, reset byte counter */
|
||||
memcpy(X, ctx->XSave, Xlen);
|
||||
/*
|
||||
* The following two lines rely of the fact that the real Skein contexts are
|
||||
* a union in out context and thus have tha maximum memory available.
|
||||
* The beautiy of C :-) .
|
||||
*/
|
||||
X = ctx->m.s256.X;
|
||||
Xlen = ctx->skeinSize/8;
|
||||
/* Restore the chaing variable, reset byte counter */
|
||||
memcpy(X, ctx->XSave, Xlen);
|
||||
|
||||
/* Setup context to process the message */
|
||||
Skein_Start_New_Type(&ctx->m, MSG);
|
||||
/* Setup context to process the message */
|
||||
Skein_Start_New_Type(&ctx->m, MSG);
|
||||
}
|
||||
|
||||
int skeinUpdate(struct skein_ctx *ctx, const u8 *msg,
|
||||
size_t msgByteCnt)
|
||||
size_t msgByteCnt)
|
||||
{
|
||||
int ret = SKEIN_FAIL;
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
int ret = SKEIN_FAIL;
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_Update(&ctx->m.s256, (const u8 *)msg, msgByteCnt);
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_Update(&ctx->m.s512, (const u8 *)msg, msgByteCnt);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_Update(&ctx->m.s1024, (const u8 *)msg, msgByteCnt);
|
||||
break;
|
||||
}
|
||||
return ret;
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_Update(&ctx->m.s256, (const u8 *)msg, msgByteCnt);
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_Update(&ctx->m.s512, (const u8 *)msg, msgByteCnt);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_Update(&ctx->m.s1024, (const u8 *)msg, msgByteCnt);
|
||||
break;
|
||||
}
|
||||
return ret;
|
||||
|
||||
}
|
||||
|
||||
int skeinUpdateBits(struct skein_ctx *ctx, const u8 *msg,
|
||||
size_t msgBitCnt)
|
||||
size_t msgBitCnt)
|
||||
{
|
||||
/*
|
||||
* I've used the bit pad implementation from skein_test.c (see NIST CD)
|
||||
* and modified it to use the convenience functions and added some pointer
|
||||
* arithmetic.
|
||||
*/
|
||||
size_t length;
|
||||
u8 mask;
|
||||
u8 *up;
|
||||
/*
|
||||
* I've used the bit pad implementation from skein_test.c (see NIST CD)
|
||||
* and modified it to use the convenience functions and added some pointer
|
||||
* arithmetic.
|
||||
*/
|
||||
size_t length;
|
||||
u8 mask;
|
||||
u8 *up;
|
||||
|
||||
/* only the final Update() call is allowed do partial bytes, else assert an error */
|
||||
Skein_Assert((ctx->m.h.T[1] & SKEIN_T1_FLAG_BIT_PAD) == 0 || msgBitCnt == 0, SKEIN_FAIL);
|
||||
/* only the final Update() call is allowed do partial bytes, else assert an error */
|
||||
Skein_Assert((ctx->m.h.T[1] & SKEIN_T1_FLAG_BIT_PAD) == 0 || msgBitCnt == 0, SKEIN_FAIL);
|
||||
|
||||
/* if number of bits is a multiple of bytes - that's easy */
|
||||
if ((msgBitCnt & 0x7) == 0) {
|
||||
return skeinUpdate(ctx, msg, msgBitCnt >> 3);
|
||||
}
|
||||
skeinUpdate(ctx, msg, (msgBitCnt >> 3) + 1);
|
||||
/* if number of bits is a multiple of bytes - that's easy */
|
||||
if ((msgBitCnt & 0x7) == 0) {
|
||||
return skeinUpdate(ctx, msg, msgBitCnt >> 3);
|
||||
}
|
||||
skeinUpdate(ctx, msg, (msgBitCnt >> 3) + 1);
|
||||
|
||||
/*
|
||||
* The next line rely on the fact that the real Skein contexts
|
||||
* are a union in our context. After the addition the pointer points to
|
||||
* Skein's real partial block buffer.
|
||||
* If this layout ever changes we have to adapt this as well.
|
||||
*/
|
||||
up = (u8 *)ctx->m.s256.X + ctx->skeinSize / 8;
|
||||
/*
|
||||
* The next line rely on the fact that the real Skein contexts
|
||||
* are a union in our context. After the addition the pointer points to
|
||||
* Skein's real partial block buffer.
|
||||
* If this layout ever changes we have to adapt this as well.
|
||||
*/
|
||||
up = (u8 *)ctx->m.s256.X + ctx->skeinSize / 8;
|
||||
|
||||
Skein_Set_Bit_Pad_Flag(ctx->m.h); /* set tweak flag for the skeinFinal call */
|
||||
Skein_Set_Bit_Pad_Flag(ctx->m.h); /* set tweak flag for the skeinFinal call */
|
||||
|
||||
/* now "pad" the final partial byte the way NIST likes */
|
||||
length = ctx->m.h.bCnt; /* get the bCnt value (same location for all block sizes) */
|
||||
Skein_assert(length != 0); /* internal sanity check: there IS a partial byte in the buffer! */
|
||||
mask = (u8) (1u << (7 - (msgBitCnt & 7))); /* partial byte bit mask */
|
||||
up[length-1] = (u8)((up[length-1] & (0-mask))|mask); /* apply bit padding on final byte (in the buffer) */
|
||||
/* now "pad" the final partial byte the way NIST likes */
|
||||
length = ctx->m.h.bCnt; /* get the bCnt value (same location for all block sizes) */
|
||||
Skein_assert(length != 0); /* internal sanity check: there IS a partial byte in the buffer! */
|
||||
mask = (u8) (1u << (7 - (msgBitCnt & 7))); /* partial byte bit mask */
|
||||
up[length-1] = (u8)((up[length-1] & (0-mask))|mask); /* apply bit padding on final byte (in the buffer) */
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
int skeinFinal(struct skein_ctx *ctx, u8 *hash)
|
||||
{
|
||||
int ret = SKEIN_FAIL;
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
int ret = SKEIN_FAIL;
|
||||
Skein_Assert(ctx, SKEIN_FAIL);
|
||||
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_Final(&ctx->m.s256, (u8 *)hash);
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_Final(&ctx->m.s512, (u8 *)hash);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_Final(&ctx->m.s1024, (u8 *)hash);
|
||||
break;
|
||||
}
|
||||
return ret;
|
||||
switch (ctx->skeinSize) {
|
||||
case Skein256:
|
||||
ret = Skein_256_Final(&ctx->m.s256, (u8 *)hash);
|
||||
break;
|
||||
case Skein512:
|
||||
ret = Skein_512_Final(&ctx->m.s512, (u8 *)hash);
|
||||
break;
|
||||
case Skein1024:
|
||||
ret = Skein1024_Final(&ctx->m.s1024, (u8 *)hash);
|
||||
break;
|
||||
}
|
||||
return ret;
|
||||
}
|
||||
|
|
|
@ -6,167 +6,167 @@
|
|||
|
||||
/***************************** Skein_256 ******************************/
|
||||
void Skein_256_Process_Block(struct skein_256_ctx *ctx, const u8 *blkPtr,
|
||||
size_t blkCnt, size_t byteCntAdd)
|
||||
size_t blkCnt, size_t byteCntAdd)
|
||||
{
|
||||
struct threefish_key key;
|
||||
u64 tweak[2];
|
||||
int i;
|
||||
u64 w[SKEIN_256_STATE_WORDS]; /* local copy of input block */
|
||||
u64 words[3];
|
||||
struct threefish_key key;
|
||||
u64 tweak[2];
|
||||
int i;
|
||||
u64 w[SKEIN_256_STATE_WORDS]; /* local copy of input block */
|
||||
u64 words[3];
|
||||
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
tweak[0] = ctx->h.T[0];
|
||||
tweak[1] = ctx->h.T[1];
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
tweak[0] = ctx->h.T[0];
|
||||
tweak[1] = ctx->h.T[1];
|
||||
|
||||
do {
|
||||
u64 carry = byteCntAdd;
|
||||
do {
|
||||
u64 carry = byteCntAdd;
|
||||
|
||||
words[0] = tweak[0] & 0xffffffffL;
|
||||
words[1] = ((tweak[0] >> 32) & 0xffffffffL);
|
||||
words[2] = (tweak[1] & 0xffffffffL);
|
||||
words[0] = tweak[0] & 0xffffffffL;
|
||||
words[1] = ((tweak[0] >> 32) & 0xffffffffL);
|
||||
words[2] = (tweak[1] & 0xffffffffL);
|
||||
|
||||
for (i = 0; i < 3; i++) {
|
||||
carry += words[i];
|
||||
words[i] = carry;
|
||||
carry >>= 32;
|
||||
}
|
||||
tweak[0] = words[0] & 0xffffffffL;
|
||||
tweak[0] |= (words[1] & 0xffffffffL) << 32;
|
||||
tweak[1] |= words[2] & 0xffffffffL;
|
||||
for (i = 0; i < 3; i++) {
|
||||
carry += words[i];
|
||||
words[i] = carry;
|
||||
carry >>= 32;
|
||||
}
|
||||
tweak[0] = words[0] & 0xffffffffL;
|
||||
tweak[0] |= (words[1] & 0xffffffffL) << 32;
|
||||
tweak[1] |= words[2] & 0xffffffffL;
|
||||
|
||||
threefishSetKey(&key, Threefish256, ctx->X, tweak);
|
||||
threefishSetKey(&key, Threefish256, ctx->X, tweak);
|
||||
|
||||
Skein_Get64_LSB_First(w, blkPtr, SKEIN_256_STATE_WORDS); /* get input block in little-endian format */
|
||||
Skein_Get64_LSB_First(w, blkPtr, SKEIN_256_STATE_WORDS); /* get input block in little-endian format */
|
||||
|
||||
threefishEncryptBlockWords(&key, w, ctx->X);
|
||||
threefishEncryptBlockWords(&key, w, ctx->X);
|
||||
|
||||
blkPtr += SKEIN_256_BLOCK_BYTES;
|
||||
blkPtr += SKEIN_256_BLOCK_BYTES;
|
||||
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = ctx->X[0] ^ w[0];
|
||||
ctx->X[1] = ctx->X[1] ^ w[1];
|
||||
ctx->X[2] = ctx->X[2] ^ w[2];
|
||||
ctx->X[3] = ctx->X[3] ^ w[3];
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = ctx->X[0] ^ w[0];
|
||||
ctx->X[1] = ctx->X[1] ^ w[1];
|
||||
ctx->X[2] = ctx->X[2] ^ w[2];
|
||||
ctx->X[3] = ctx->X[3] ^ w[3];
|
||||
|
||||
tweak[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
} while (--blkCnt);
|
||||
tweak[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
} while (--blkCnt);
|
||||
|
||||
ctx->h.T[0] = tweak[0];
|
||||
ctx->h.T[1] = tweak[1];
|
||||
ctx->h.T[0] = tweak[0];
|
||||
ctx->h.T[1] = tweak[1];
|
||||
}
|
||||
|
||||
void Skein_512_Process_Block(struct skein_512_ctx *ctx, const u8 *blkPtr,
|
||||
size_t blkCnt, size_t byteCntAdd)
|
||||
size_t blkCnt, size_t byteCntAdd)
|
||||
{
|
||||
struct threefish_key key;
|
||||
u64 tweak[2];
|
||||
int i;
|
||||
u64 words[3];
|
||||
u64 w[SKEIN_512_STATE_WORDS]; /* local copy of input block */
|
||||
struct threefish_key key;
|
||||
u64 tweak[2];
|
||||
int i;
|
||||
u64 words[3];
|
||||
u64 w[SKEIN_512_STATE_WORDS]; /* local copy of input block */
|
||||
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
tweak[0] = ctx->h.T[0];
|
||||
tweak[1] = ctx->h.T[1];
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
tweak[0] = ctx->h.T[0];
|
||||
tweak[1] = ctx->h.T[1];
|
||||
|
||||
do {
|
||||
u64 carry = byteCntAdd;
|
||||
do {
|
||||
u64 carry = byteCntAdd;
|
||||
|
||||
words[0] = tweak[0] & 0xffffffffL;
|
||||
words[1] = ((tweak[0] >> 32) & 0xffffffffL);
|
||||
words[2] = (tweak[1] & 0xffffffffL);
|
||||
words[0] = tweak[0] & 0xffffffffL;
|
||||
words[1] = ((tweak[0] >> 32) & 0xffffffffL);
|
||||
words[2] = (tweak[1] & 0xffffffffL);
|
||||
|
||||
for (i = 0; i < 3; i++) {
|
||||
carry += words[i];
|
||||
words[i] = carry;
|
||||
carry >>= 32;
|
||||
}
|
||||
tweak[0] = words[0] & 0xffffffffL;
|
||||
tweak[0] |= (words[1] & 0xffffffffL) << 32;
|
||||
tweak[1] |= words[2] & 0xffffffffL;
|
||||
for (i = 0; i < 3; i++) {
|
||||
carry += words[i];
|
||||
words[i] = carry;
|
||||
carry >>= 32;
|
||||
}
|
||||
tweak[0] = words[0] & 0xffffffffL;
|
||||
tweak[0] |= (words[1] & 0xffffffffL) << 32;
|
||||
tweak[1] |= words[2] & 0xffffffffL;
|
||||
|
||||
threefishSetKey(&key, Threefish512, ctx->X, tweak);
|
||||
threefishSetKey(&key, Threefish512, ctx->X, tweak);
|
||||
|
||||
Skein_Get64_LSB_First(w, blkPtr, SKEIN_512_STATE_WORDS); /* get input block in little-endian format */
|
||||
Skein_Get64_LSB_First(w, blkPtr, SKEIN_512_STATE_WORDS); /* get input block in little-endian format */
|
||||
|
||||
threefishEncryptBlockWords(&key, w, ctx->X);
|
||||
threefishEncryptBlockWords(&key, w, ctx->X);
|
||||
|
||||
blkPtr += SKEIN_512_BLOCK_BYTES;
|
||||
blkPtr += SKEIN_512_BLOCK_BYTES;
|
||||
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = ctx->X[0] ^ w[0];
|
||||
ctx->X[1] = ctx->X[1] ^ w[1];
|
||||
ctx->X[2] = ctx->X[2] ^ w[2];
|
||||
ctx->X[3] = ctx->X[3] ^ w[3];
|
||||
ctx->X[4] = ctx->X[4] ^ w[4];
|
||||
ctx->X[5] = ctx->X[5] ^ w[5];
|
||||
ctx->X[6] = ctx->X[6] ^ w[6];
|
||||
ctx->X[7] = ctx->X[7] ^ w[7];
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = ctx->X[0] ^ w[0];
|
||||
ctx->X[1] = ctx->X[1] ^ w[1];
|
||||
ctx->X[2] = ctx->X[2] ^ w[2];
|
||||
ctx->X[3] = ctx->X[3] ^ w[3];
|
||||
ctx->X[4] = ctx->X[4] ^ w[4];
|
||||
ctx->X[5] = ctx->X[5] ^ w[5];
|
||||
ctx->X[6] = ctx->X[6] ^ w[6];
|
||||
ctx->X[7] = ctx->X[7] ^ w[7];
|
||||
|
||||
tweak[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
} while (--blkCnt);
|
||||
tweak[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
} while (--blkCnt);
|
||||
|
||||
ctx->h.T[0] = tweak[0];
|
||||
ctx->h.T[1] = tweak[1];
|
||||
ctx->h.T[0] = tweak[0];
|
||||
ctx->h.T[1] = tweak[1];
|
||||
}
|
||||
|
||||
void Skein1024_Process_Block(struct skein1024_ctx *ctx, const u8 *blkPtr,
|
||||
size_t blkCnt, size_t byteCntAdd)
|
||||
size_t blkCnt, size_t byteCntAdd)
|
||||
{
|
||||
struct threefish_key key;
|
||||
u64 tweak[2];
|
||||
int i;
|
||||
u64 words[3];
|
||||
u64 w[SKEIN1024_STATE_WORDS]; /* local copy of input block */
|
||||
struct threefish_key key;
|
||||
u64 tweak[2];
|
||||
int i;
|
||||
u64 words[3];
|
||||
u64 w[SKEIN1024_STATE_WORDS]; /* local copy of input block */
|
||||
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
tweak[0] = ctx->h.T[0];
|
||||
tweak[1] = ctx->h.T[1];
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
tweak[0] = ctx->h.T[0];
|
||||
tweak[1] = ctx->h.T[1];
|
||||
|
||||
do {
|
||||
u64 carry = byteCntAdd;
|
||||
do {
|
||||
u64 carry = byteCntAdd;
|
||||
|
||||
words[0] = tweak[0] & 0xffffffffL;
|
||||
words[1] = ((tweak[0] >> 32) & 0xffffffffL);
|
||||
words[2] = (tweak[1] & 0xffffffffL);
|
||||
words[0] = tweak[0] & 0xffffffffL;
|
||||
words[1] = ((tweak[0] >> 32) & 0xffffffffL);
|
||||
words[2] = (tweak[1] & 0xffffffffL);
|
||||
|
||||
for (i = 0; i < 3; i++) {
|
||||
carry += words[i];
|
||||
words[i] = carry;
|
||||
carry >>= 32;
|
||||
}
|
||||
tweak[0] = words[0] & 0xffffffffL;
|
||||
tweak[0] |= (words[1] & 0xffffffffL) << 32;
|
||||
tweak[1] |= words[2] & 0xffffffffL;
|
||||
for (i = 0; i < 3; i++) {
|
||||
carry += words[i];
|
||||
words[i] = carry;
|
||||
carry >>= 32;
|
||||
}
|
||||
tweak[0] = words[0] & 0xffffffffL;
|
||||
tweak[0] |= (words[1] & 0xffffffffL) << 32;
|
||||
tweak[1] |= words[2] & 0xffffffffL;
|
||||
|
||||
threefishSetKey(&key, Threefish1024, ctx->X, tweak);
|
||||
threefishSetKey(&key, Threefish1024, ctx->X, tweak);
|
||||
|
||||
Skein_Get64_LSB_First(w, blkPtr, SKEIN1024_STATE_WORDS); /* get input block in little-endian format */
|
||||
Skein_Get64_LSB_First(w, blkPtr, SKEIN1024_STATE_WORDS); /* get input block in little-endian format */
|
||||
|
||||
threefishEncryptBlockWords(&key, w, ctx->X);
|
||||
threefishEncryptBlockWords(&key, w, ctx->X);
|
||||
|
||||
blkPtr += SKEIN1024_BLOCK_BYTES;
|
||||
blkPtr += SKEIN1024_BLOCK_BYTES;
|
||||
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = ctx->X[0] ^ w[0];
|
||||
ctx->X[1] = ctx->X[1] ^ w[1];
|
||||
ctx->X[2] = ctx->X[2] ^ w[2];
|
||||
ctx->X[3] = ctx->X[3] ^ w[3];
|
||||
ctx->X[4] = ctx->X[4] ^ w[4];
|
||||
ctx->X[5] = ctx->X[5] ^ w[5];
|
||||
ctx->X[6] = ctx->X[6] ^ w[6];
|
||||
ctx->X[7] = ctx->X[7] ^ w[7];
|
||||
ctx->X[8] = ctx->X[8] ^ w[8];
|
||||
ctx->X[9] = ctx->X[9] ^ w[9];
|
||||
ctx->X[10] = ctx->X[10] ^ w[10];
|
||||
ctx->X[11] = ctx->X[11] ^ w[11];
|
||||
ctx->X[12] = ctx->X[12] ^ w[12];
|
||||
ctx->X[13] = ctx->X[13] ^ w[13];
|
||||
ctx->X[14] = ctx->X[14] ^ w[14];
|
||||
ctx->X[15] = ctx->X[15] ^ w[15];
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = ctx->X[0] ^ w[0];
|
||||
ctx->X[1] = ctx->X[1] ^ w[1];
|
||||
ctx->X[2] = ctx->X[2] ^ w[2];
|
||||
ctx->X[3] = ctx->X[3] ^ w[3];
|
||||
ctx->X[4] = ctx->X[4] ^ w[4];
|
||||
ctx->X[5] = ctx->X[5] ^ w[5];
|
||||
ctx->X[6] = ctx->X[6] ^ w[6];
|
||||
ctx->X[7] = ctx->X[7] ^ w[7];
|
||||
ctx->X[8] = ctx->X[8] ^ w[8];
|
||||
ctx->X[9] = ctx->X[9] ^ w[9];
|
||||
ctx->X[10] = ctx->X[10] ^ w[10];
|
||||
ctx->X[11] = ctx->X[11] ^ w[11];
|
||||
ctx->X[12] = ctx->X[12] ^ w[12];
|
||||
ctx->X[13] = ctx->X[13] ^ w[13];
|
||||
ctx->X[14] = ctx->X[14] ^ w[14];
|
||||
ctx->X[15] = ctx->X[15] ^ w[15];
|
||||
|
||||
tweak[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
} while (--blkCnt);
|
||||
tweak[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
} while (--blkCnt);
|
||||
|
||||
ctx->h.T[0] = tweak[0];
|
||||
ctx->h.T[1] = tweak[1];
|
||||
ctx->h.T[0] = tweak[0];
|
||||
ctx->h.T[1] = tweak[1];
|
||||
}
|
||||
|
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
|
@ -3,346 +3,345 @@
|
|||
|
||||
|
||||
void threefishEncrypt256(struct threefish_key *keyCtx, u64 *input, u64 *output)
|
||||
{
|
||||
{
|
||||
u64 b0 = input[0], b1 = input[1],
|
||||
b2 = input[2], b3 = input[3];
|
||||
u64 k0 = keyCtx->key[0], k1 = keyCtx->key[1],
|
||||
k2 = keyCtx->key[2], k3 = keyCtx->key[3],
|
||||
k4 = keyCtx->key[4];
|
||||
u64 t0 = keyCtx->tweak[0], t1 = keyCtx->tweak[1],
|
||||
t2 = keyCtx->tweak[2];
|
||||
|
||||
u64 b0 = input[0], b1 = input[1],
|
||||
b2 = input[2], b3 = input[3];
|
||||
u64 k0 = keyCtx->key[0], k1 = keyCtx->key[1],
|
||||
k2 = keyCtx->key[2], k3 = keyCtx->key[3],
|
||||
k4 = keyCtx->key[4];
|
||||
u64 t0 = keyCtx->tweak[0], t1 = keyCtx->tweak[1],
|
||||
t2 = keyCtx->tweak[2];
|
||||
b1 += k1 + t0; b0 += b1 + k0; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k3; b2 += b3 + k2 + t1; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k2 + t1; b0 += b1 + k1; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k4 + 1; b2 += b3 + k3 + t2; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k1 + t0; b0 += b1 + k0; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k3; b2 += b3 + k2 + t1; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k2 + t1; b0 += b1 + k1; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k4 + 1; b2 += b3 + k3 + t2; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k3 + t2; b0 += b1 + k2; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k0 + 2; b2 += b3 + k4 + t0; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k4 + t0; b0 += b1 + k3; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k1 + 3; b2 += b3 + k0 + t1; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k3 + t2; b0 += b1 + k2; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k0 + 2; b2 += b3 + k4 + t0; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k4 + t0; b0 += b1 + k3; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k1 + 3; b2 += b3 + k0 + t1; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k0 + t1; b0 += b1 + k4; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k2 + 4; b2 += b3 + k1 + t2; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k1 + t2; b0 += b1 + k0; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k3 + 5; b2 += b3 + k2 + t0; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k0 + t1; b0 += b1 + k4; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k2 + 4; b2 += b3 + k1 + t2; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k1 + t2; b0 += b1 + k0; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k3 + 5; b2 += b3 + k2 + t0; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k2 + t0; b0 += b1 + k1; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k4 + 6; b2 += b3 + k3 + t1; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k3 + t1; b0 += b1 + k2; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k0 + 7; b2 += b3 + k4 + t2; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k2 + t0; b0 += b1 + k1; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k4 + 6; b2 += b3 + k3 + t1; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k3 + t1; b0 += b1 + k2; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k0 + 7; b2 += b3 + k4 + t2; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k4 + t2; b0 += b1 + k3; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k1 + 8; b2 += b3 + k0 + t0; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k0 + t0; b0 += b1 + k4; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k2 + 9; b2 += b3 + k1 + t1; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k4 + t2; b0 += b1 + k3; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k1 + 8; b2 += b3 + k0 + t0; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k0 + t0; b0 += b1 + k4; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k2 + 9; b2 += b3 + k1 + t1; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k1 + t1; b0 += b1 + k0; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k3 + 10; b2 += b3 + k2 + t2; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k2 + t2; b0 += b1 + k1; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k4 + 11; b2 += b3 + k3 + t0; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k1 + t1; b0 += b1 + k0; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k3 + 10; b2 += b3 + k2 + t2; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k2 + t2; b0 += b1 + k1; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k4 + 11; b2 += b3 + k3 + t0; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k3 + t0; b0 += b1 + k2; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k0 + 12; b2 += b3 + k4 + t1; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k4 + t1; b0 += b1 + k3; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k1 + 13; b2 += b3 + k0 + t2; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k3 + t0; b0 += b1 + k2; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k0 + 12; b2 += b3 + k4 + t1; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k4 + t1; b0 += b1 + k3; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k1 + 13; b2 += b3 + k0 + t2; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k0 + t2; b0 += b1 + k4; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k2 + 14; b2 += b3 + k1 + t0; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k1 + t0; b0 += b1 + k0; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k3 + 15; b2 += b3 + k2 + t1; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k0 + t2; b0 += b1 + k4; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k2 + 14; b2 += b3 + k1 + t0; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k1 + t0; b0 += b1 + k0; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k3 + 15; b2 += b3 + k2 + t1; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
b1 += k2 + t1; b0 += b1 + k1; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k4 + 16; b2 += b3 + k3 + t2; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k3 + t2; b0 += b1 + k2; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k0 + 17; b2 += b3 + k4 + t0; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
b1 += k2 + t1; b0 += b1 + k1; b1 = ((b1 << 14) | (b1 >> (64 - 14))) ^ b0;
|
||||
b3 += k4 + 16; b2 += b3 + k3 + t2; b3 = ((b3 << 16) | (b3 >> (64 - 16))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 52) | (b3 >> (64 - 52))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 57) | (b1 >> (64 - 57))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 23) | (b1 >> (64 - 23))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 40) | (b3 >> (64 - 40))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 5) | (b3 >> (64 - 5))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 37) | (b1 >> (64 - 37))) ^ b2;
|
||||
b1 += k3 + t2; b0 += b1 + k2; b1 = ((b1 << 25) | (b1 >> (64 - 25))) ^ b0;
|
||||
b3 += k0 + 17; b2 += b3 + k4 + t0; b3 = ((b3 << 33) | (b3 >> (64 - 33))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 46) | (b3 >> (64 - 46))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 12) | (b1 >> (64 - 12))) ^ b2;
|
||||
b0 += b1; b1 = ((b1 << 58) | (b1 >> (64 - 58))) ^ b0;
|
||||
b2 += b3; b3 = ((b3 << 22) | (b3 >> (64 - 22))) ^ b2;
|
||||
b0 += b3; b3 = ((b3 << 32) | (b3 >> (64 - 32))) ^ b0;
|
||||
b2 += b1; b1 = ((b1 << 32) | (b1 >> (64 - 32))) ^ b2;
|
||||
|
||||
output[0] = b0 + k3;
|
||||
output[1] = b1 + k4 + t0;
|
||||
output[2] = b2 + k0 + t1;
|
||||
output[3] = b3 + k1 + 18;
|
||||
}
|
||||
output[0] = b0 + k3;
|
||||
output[1] = b1 + k4 + t0;
|
||||
output[2] = b2 + k0 + t1;
|
||||
output[3] = b3 + k1 + 18;
|
||||
}
|
||||
|
||||
void threefishDecrypt256(struct threefish_key *keyCtx, u64 *input, u64 *output)
|
||||
{
|
||||
u64 b0 = input[0], b1 = input[1],
|
||||
b2 = input[2], b3 = input[3];
|
||||
u64 k0 = keyCtx->key[0], k1 = keyCtx->key[1],
|
||||
k2 = keyCtx->key[2], k3 = keyCtx->key[3],
|
||||
k4 = keyCtx->key[4];
|
||||
u64 t0 = keyCtx->tweak[0], t1 = keyCtx->tweak[1],
|
||||
t2 = keyCtx->tweak[2];
|
||||
{
|
||||
u64 b0 = input[0], b1 = input[1],
|
||||
b2 = input[2], b3 = input[3];
|
||||
u64 k0 = keyCtx->key[0], k1 = keyCtx->key[1],
|
||||
k2 = keyCtx->key[2], k3 = keyCtx->key[3],
|
||||
k4 = keyCtx->key[4];
|
||||
u64 t0 = keyCtx->tweak[0], t1 = keyCtx->tweak[1],
|
||||
t2 = keyCtx->tweak[2];
|
||||
|
||||
u64 tmp;
|
||||
u64 tmp;
|
||||
|
||||
b0 -= k3;
|
||||
b1 -= k4 + t0;
|
||||
b2 -= k0 + t1;
|
||||
b3 -= k1 + 18;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k2; b1 -= k3 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k4 + t0; b3 -= k0 + 17;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k1; b1 -= k2 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k3 + t2; b3 -= k4 + 16;
|
||||
b0 -= k3;
|
||||
b1 -= k4 + t0;
|
||||
b2 -= k0 + t1;
|
||||
b3 -= k1 + 18;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k2; b1 -= k3 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k4 + t0; b3 -= k0 + 17;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k1; b1 -= k2 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k3 + t2; b3 -= k4 + 16;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k0; b1 -= k1 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k2 + t1; b3 -= k3 + 15;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k4; b1 -= k0 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k1 + t0; b3 -= k2 + 14;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k0; b1 -= k1 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k2 + t1; b3 -= k3 + 15;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k4; b1 -= k0 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k1 + t0; b3 -= k2 + 14;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k3; b1 -= k4 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k0 + t2; b3 -= k1 + 13;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k2; b1 -= k3 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k4 + t1; b3 -= k0 + 12;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k3; b1 -= k4 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k0 + t2; b3 -= k1 + 13;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k2; b1 -= k3 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k4 + t1; b3 -= k0 + 12;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k1; b1 -= k2 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k3 + t0; b3 -= k4 + 11;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k0; b1 -= k1 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k2 + t2; b3 -= k3 + 10;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k1; b1 -= k2 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k3 + t0; b3 -= k4 + 11;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k0; b1 -= k1 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k2 + t2; b3 -= k3 + 10;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k4; b1 -= k0 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k1 + t1; b3 -= k2 + 9;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k3; b1 -= k4 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k0 + t0; b3 -= k1 + 8;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k4; b1 -= k0 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k1 + t1; b3 -= k2 + 9;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k3; b1 -= k4 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k0 + t0; b3 -= k1 + 8;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k2; b1 -= k3 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k4 + t2; b3 -= k0 + 7;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k1; b1 -= k2 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k3 + t1; b3 -= k4 + 6;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k2; b1 -= k3 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k4 + t2; b3 -= k0 + 7;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k1; b1 -= k2 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k3 + t1; b3 -= k4 + 6;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k0; b1 -= k1 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k2 + t0; b3 -= k3 + 5;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k4; b1 -= k0 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k1 + t2; b3 -= k2 + 4;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k0; b1 -= k1 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k2 + t0; b3 -= k3 + 5;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k4; b1 -= k0 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k1 + t2; b3 -= k2 + 4;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k3; b1 -= k4 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k0 + t1; b3 -= k1 + 3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k2; b1 -= k3 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k4 + t0; b3 -= k0 + 2;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k3; b1 -= k4 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k0 + t1; b3 -= k1 + 3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k2; b1 -= k3 + t2;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k4 + t0; b3 -= k0 + 2;
|
||||
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k1; b1 -= k2 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k3 + t2; b3 -= k4 + 1;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k0; b1 -= k1 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k2 + t1; b3 -= k3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 32) | (tmp << (64 - 32)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 32) | (tmp << (64 - 32)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 58) | (tmp << (64 - 58)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 22) | (tmp << (64 - 22)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 46) | (tmp << (64 - 46)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 12) | (tmp << (64 - 12)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 25) | (tmp << (64 - 25)); b0 -= b1 + k1; b1 -= k2 + t1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 33) | (tmp << (64 - 33)); b2 -= b3 + k3 + t2; b3 -= k4 + 1;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 5) | (tmp << (64 - 5)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 37) | (tmp << (64 - 37)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 23) | (tmp << (64 - 23)); b0 -= b1;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 40) | (tmp << (64 - 40)); b2 -= b3;
|
||||
tmp = b3 ^ b0; b3 = (tmp >> 52) | (tmp << (64 - 52)); b0 -= b3;
|
||||
tmp = b1 ^ b2; b1 = (tmp >> 57) | (tmp << (64 - 57)); b2 -= b1;
|
||||
tmp = b1 ^ b0; b1 = (tmp >> 14) | (tmp << (64 - 14)); b0 -= b1 + k0; b1 -= k1 + t0;
|
||||
tmp = b3 ^ b2; b3 = (tmp >> 16) | (tmp << (64 - 16)); b2 -= b3 + k2 + t1; b3 -= k3;
|
||||
|
||||
output[0] = b0;
|
||||
output[1] = b1;
|
||||
output[2] = b2;
|
||||
output[3] = b3;
|
||||
}
|
||||
output[0] = b0;
|
||||
output[1] = b1;
|
||||
output[2] = b2;
|
||||
output[3] = b3;
|
||||
}
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -4,75 +4,75 @@
|
|||
#include <threefishApi.h>
|
||||
|
||||
void threefishSetKey(struct threefish_key *keyCtx, enum threefish_size stateSize,
|
||||
u64 *keyData, u64 *tweak)
|
||||
u64 *keyData, u64 *tweak)
|
||||
{
|
||||
int keyWords = stateSize / 64;
|
||||
int i;
|
||||
u64 parity = KeyScheduleConst;
|
||||
int keyWords = stateSize / 64;
|
||||
int i;
|
||||
u64 parity = KeyScheduleConst;
|
||||
|
||||
keyCtx->tweak[0] = tweak[0];
|
||||
keyCtx->tweak[1] = tweak[1];
|
||||
keyCtx->tweak[2] = tweak[0] ^ tweak[1];
|
||||
keyCtx->tweak[0] = tweak[0];
|
||||
keyCtx->tweak[1] = tweak[1];
|
||||
keyCtx->tweak[2] = tweak[0] ^ tweak[1];
|
||||
|
||||
for (i = 0; i < keyWords; i++) {
|
||||
keyCtx->key[i] = keyData[i];
|
||||
parity ^= keyData[i];
|
||||
}
|
||||
keyCtx->key[i] = parity;
|
||||
keyCtx->stateSize = stateSize;
|
||||
for (i = 0; i < keyWords; i++) {
|
||||
keyCtx->key[i] = keyData[i];
|
||||
parity ^= keyData[i];
|
||||
}
|
||||
keyCtx->key[i] = parity;
|
||||
keyCtx->stateSize = stateSize;
|
||||
}
|
||||
|
||||
void threefishEncryptBlockBytes(struct threefish_key *keyCtx, u8 *in,
|
||||
u8 *out)
|
||||
u8 *out)
|
||||
{
|
||||
u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
|
||||
u64 cipher[SKEIN_MAX_STATE_WORDS];
|
||||
|
||||
Skein_Get64_LSB_First(plain, in, keyCtx->stateSize / 64); /* bytes to words */
|
||||
threefishEncryptBlockWords(keyCtx, plain, cipher);
|
||||
Skein_Put64_LSB_First(out, cipher, keyCtx->stateSize / 8); /* words to bytes */
|
||||
u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
|
||||
u64 cipher[SKEIN_MAX_STATE_WORDS];
|
||||
|
||||
Skein_Get64_LSB_First(plain, in, keyCtx->stateSize / 64); /* bytes to words */
|
||||
threefishEncryptBlockWords(keyCtx, plain, cipher);
|
||||
Skein_Put64_LSB_First(out, cipher, keyCtx->stateSize / 8); /* words to bytes */
|
||||
}
|
||||
|
||||
void threefishEncryptBlockWords(struct threefish_key *keyCtx, u64 *in,
|
||||
u64 *out)
|
||||
u64 *out)
|
||||
{
|
||||
switch (keyCtx->stateSize) {
|
||||
case Threefish256:
|
||||
threefishEncrypt256(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish512:
|
||||
threefishEncrypt512(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish1024:
|
||||
threefishEncrypt1024(keyCtx, in, out);
|
||||
break;
|
||||
}
|
||||
switch (keyCtx->stateSize) {
|
||||
case Threefish256:
|
||||
threefishEncrypt256(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish512:
|
||||
threefishEncrypt512(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish1024:
|
||||
threefishEncrypt1024(keyCtx, in, out);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
void threefishDecryptBlockBytes(struct threefish_key *keyCtx, u8 *in,
|
||||
u8 *out)
|
||||
u8 *out)
|
||||
{
|
||||
u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
|
||||
u64 cipher[SKEIN_MAX_STATE_WORDS];
|
||||
|
||||
Skein_Get64_LSB_First(cipher, in, keyCtx->stateSize / 64); /* bytes to words */
|
||||
threefishDecryptBlockWords(keyCtx, cipher, plain);
|
||||
Skein_Put64_LSB_First(out, plain, keyCtx->stateSize / 8); /* words to bytes */
|
||||
u64 plain[SKEIN_MAX_STATE_WORDS]; /* max number of words*/
|
||||
u64 cipher[SKEIN_MAX_STATE_WORDS];
|
||||
|
||||
Skein_Get64_LSB_First(cipher, in, keyCtx->stateSize / 64); /* bytes to words */
|
||||
threefishDecryptBlockWords(keyCtx, cipher, plain);
|
||||
Skein_Put64_LSB_First(out, plain, keyCtx->stateSize / 8); /* words to bytes */
|
||||
}
|
||||
|
||||
void threefishDecryptBlockWords(struct threefish_key *keyCtx, u64 *in,
|
||||
u64 *out)
|
||||
u64 *out)
|
||||
{
|
||||
switch (keyCtx->stateSize) {
|
||||
case Threefish256:
|
||||
threefishDecrypt256(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish512:
|
||||
threefishDecrypt512(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish1024:
|
||||
threefishDecrypt1024(keyCtx, in, out);
|
||||
break;
|
||||
}
|
||||
switch (keyCtx->stateSize) {
|
||||
case Threefish256:
|
||||
threefishDecrypt256(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish512:
|
||||
threefishDecrypt512(keyCtx, in, out);
|
||||
break;
|
||||
case Threefish1024:
|
||||
threefishDecrypt1024(keyCtx, in, out);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue