/*
* FIPS-197 compliant AES implementation
*
* Copyright (C) 2006-2007 Christophe Devine
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* * Redistributions of source code _must_ retain the above copyright
* notice, this list of conditions and the following disclaimer.
* * Redistributions in binary form may or may not reproduce the above
* copyright notice, this list of conditions and the following
* disclaimer in the documentation and/or other materials provided
* with the distribution.
* * Neither the name of XySSL nor the names of its contributors may be
* used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
* TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
* The AES block cipher was designed by Vincent Rijmen and Joan Daemen.
*
* http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
* http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
*/ /* AES block cipher implementation from XYSSL */ #include "string_.h" /* memcmp() */
#include "aes.h" #define XYSSL_AES_ROM_TABLES 1 /* avoid regenerating tables each time */ /*
* 32-bit integer manipulation macros (little endian)
*/
#ifndef GET_ULONG_LE
#define GET_ULONG_LE(n,b,i) \
{ \
(n) = ( (unsigned long) (b)[(i) ] ) \
| ( (unsigned long) (b)[(i) + ] << ) \
| ( (unsigned long) (b)[(i) + ] << ) \
| ( (unsigned long) (b)[(i) + ] << ); \
}
#endif #ifndef PUT_ULONG_LE
#define PUT_ULONG_LE(n,b,i) \
{ \
(b)[(i) ] = (unsigned char) ( (n) ); \
(b)[(i) + ] = (unsigned char) ( (n) >> ); \
(b)[(i) + ] = (unsigned char) ( (n) >> ); \
(b)[(i) + ] = (unsigned char) ( (n) >> ); \
}
#endif #if defined(XYSSL_AES_ROM_TABLES)
/*
* Forward S-box
*/
static const unsigned char FSb[] =
{
0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5,
0x30, 0x01, 0x67, 0x2B, 0xFE, 0xD7, 0xAB, 0x76,
0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0,
0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0,
0xB7, 0xFD, 0x93, 0x26, 0x36, 0x3F, 0xF7, 0xCC,
0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15,
0x04, 0xC7, 0x23, 0xC3, 0x18, 0x96, 0x05, 0x9A,
0x07, 0x12, 0x80, 0xE2, 0xEB, 0x27, 0xB2, 0x75,
0x09, 0x83, 0x2C, 0x1A, 0x1B, 0x6E, 0x5A, 0xA0,
0x52, 0x3B, 0xD6, 0xB3, 0x29, 0xE3, 0x2F, 0x84,
0x53, 0xD1, 0x00, 0xED, 0x20, 0xFC, 0xB1, 0x5B,
0x6A, 0xCB, 0xBE, 0x39, 0x4A, 0x4C, 0x58, 0xCF,
0xD0, 0xEF, 0xAA, 0xFB, 0x43, 0x4D, 0x33, 0x85,
0x45, 0xF9, 0x02, 0x7F, 0x50, 0x3C, 0x9F, 0xA8,
0x51, 0xA3, 0x40, 0x8F, 0x92, 0x9D, 0x38, 0xF5,
0xBC, 0xB6, 0xDA, 0x21, 0x10, 0xFF, 0xF3, 0xD2,
0xCD, 0x0C, 0x13, 0xEC, 0x5F, 0x97, 0x44, 0x17,
0xC4, 0xA7, 0x7E, 0x3D, 0x64, 0x5D, 0x19, 0x73,
0x60, 0x81, 0x4F, 0xDC, 0x22, 0x2A, 0x90, 0x88,
0x46, 0xEE, 0xB8, 0x14, 0xDE, 0x5E, 0x0B, 0xDB,
0xE0, 0x32, 0x3A, 0x0A, 0x49, 0x06, 0x24, 0x5C,
0xC2, 0xD3, 0xAC, 0x62, 0x91, 0x95, 0xE4, 0x79,
0xE7, 0xC8, 0x37, 0x6D, 0x8D, 0xD5, 0x4E, 0xA9,
0x6C, 0x56, 0xF4, 0xEA, 0x65, 0x7A, 0xAE, 0x08,
0xBA, 0x78, 0x25, 0x2E, 0x1C, 0xA6, 0xB4, 0xC6,
0xE8, 0xDD, 0x74, 0x1F, 0x4B, 0xBD, 0x8B, 0x8A,
0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E,
0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E,
0xE1, 0xF8, 0x98, 0x11, 0x69, 0xD9, 0x8E, 0x94,
0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF,
0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68,
0x41, 0x99, 0x2D, 0x0F, 0xB0, 0x54, 0xBB, 0x16
}; /*
* Forward tables
*/
#define FT \
\
V(A5,,,C6), V(,7C,7C,F8), V(,,,EE), V(8D,7B,7B,F6), \
V(0D,F2,F2,FF), V(BD,6B,6B,D6), V(B1,6F,6F,DE), V(,C5,C5,), \
V(,,,), V(,,,), V(A9,,,CE), V(7D,2B,2B,), \
V(,FE,FE,E7), V(,D7,D7,B5), V(E6,AB,AB,4D), V(9A,,,EC), \
V(,CA,CA,8F), V(9D,,,1F), V(,C9,C9,), V(,7D,7D,FA), \
V(,FA,FA,EF), V(EB,,,B2), V(C9,,,8E), V(0B,F0,F0,FB), \
V(EC,AD,AD,), V(,D4,D4,B3), V(FD,A2,A2,5F), V(EA,AF,AF,), \
V(BF,9C,9C,), V(F7,A4,A4,), V(,,,E4), V(5B,C0,C0,9B), \
V(C2,B7,B7,), V(1C,FD,FD,E1), V(AE,,,3D), V(6A,,,4C), \
V(5A,,,6C), V(,3F,3F,7E), V(,F7,F7,F5), V(4F,CC,CC,), \
V(5C,,,), V(F4,A5,A5,), V(,E5,E5,D1), V(,F1,F1,F9), \
V(,,,E2), V(,D8,D8,AB), V(,,,), V(3F,,,2A), \
V(0C,,,), V(,C7,C7,), V(,,,), V(5E,C3,C3,9D), \
V(,,,), V(A1,,,), V(0F,,,0A), V(B5,9A,9A,2F), \
V(,,,0E), V(,,,), V(9B,,,1B), V(3D,E2,E2,DF), \
V(,EB,EB,CD), V(,,,4E), V(CD,B2,B2,7F), V(9F,,,EA), \
V(1B,,,), V(9E,,,1D), V(,2C,2C,), V(2E,1A,1A,), \
V(2D,1B,1B,), V(B2,6E,6E,DC), V(EE,5A,5A,B4), V(FB,A0,A0,5B), \
V(F6,,,A4), V(4D,3B,3B,), V(,D6,D6,B7), V(CE,B3,B3,7D), \
V(7B,,,), V(3E,E3,E3,DD), V(,2F,2F,5E), V(,,,), \
V(F5,,,A6), V(,D1,D1,B9), V(,,,), V(2C,ED,ED,C1), \
V(,,,), V(1F,FC,FC,E3), V(C8,B1,B1,), V(ED,5B,5B,B6), \
V(BE,6A,6A,D4), V(,CB,CB,8D), V(D9,BE,BE,), V(4B,,,), \
V(DE,4A,4A,), V(D4,4C,4C,), V(E8,,,B0), V(4A,CF,CF,), \
V(6B,D0,D0,BB), V(2A,EF,EF,C5), V(E5,AA,AA,4F), V(,FB,FB,ED), \
V(C5,,,), V(D7,4D,4D,9A), V(,,,), V(,,,), \
V(CF,,,8A), V(,F9,F9,E9), V(,,,), V(,7F,7F,FE), \
V(F0,,,A0), V(,3C,3C,), V(BA,9F,9F,), V(E3,A8,A8,4B), \
V(F3,,,A2), V(FE,A3,A3,5D), V(C0,,,), V(8A,8F,8F,), \
V(AD,,,3F), V(BC,9D,9D,), V(,,,), V(,F5,F5,F1), \
V(DF,BC,BC,), V(C1,B6,B6,), V(,DA,DA,AF), V(,,,), \
V(,,,), V(1A,FF,FF,E5), V(0E,F3,F3,FD), V(6D,D2,D2,BF), \
V(4C,CD,CD,), V(,0C,0C,), V(,,,), V(2F,EC,EC,C3), \
V(E1,5F,5F,BE), V(A2,,,), V(CC,,,), V(,,,2E), \
V(,C4,C4,), V(F2,A7,A7,), V(,7E,7E,FC), V(,3D,3D,7A), \
V(AC,,,C8), V(E7,5D,5D,BA), V(2B,,,), V(,,,E6), \
V(A0,,,C0), V(,,,), V(D1,4F,4F,9E), V(7F,DC,DC,A3), \
V(,,,), V(7E,2A,2A,), V(AB,,,3B), V(,,,0B), \
V(CA,,,8C), V(,EE,EE,C7), V(D3,B8,B8,6B), V(3C,,,), \
V(,DE,DE,A7), V(E2,5E,5E,BC), V(1D,0B,0B,), V(,DB,DB,AD), \
V(3B,E0,E0,DB), V(,,,), V(4E,3A,3A,), V(1E,0A,0A,), \
V(DB,,,), V(0A,,,0C), V(6C,,,), V(E4,5C,5C,B8), \
V(5D,C2,C2,9F), V(6E,D3,D3,BD), V(EF,AC,AC,), V(A6,,,C4), \
V(A8,,,), V(A4,,,), V(,E4,E4,D3), V(8B,,,F2), \
V(,E7,E7,D5), V(,C8,C8,8B), V(,,,6E), V(B7,6D,6D,DA), \
V(8C,8D,8D,), V(,D5,D5,B1), V(D2,4E,4E,9C), V(E0,A9,A9,), \
V(B4,6C,6C,D8), V(FA,,,AC), V(,F4,F4,F3), V(,EA,EA,CF), \
V(AF,,,CA), V(8E,7A,7A,F4), V(E9,AE,AE,), V(,,,), \
V(D5,BA,BA,6F), V(,,,F0), V(6F,,,4A), V(,2E,2E,5C), \
V(,1C,1C,), V(F1,A6,A6,), V(C7,B4,B4,), V(,C6,C6,), \
V(,E8,E8,CB), V(7C,DD,DD,A1), V(9C,,,E8), V(,1F,1F,3E), \
V(DD,4B,4B,), V(DC,BD,BD,), V(,8B,8B,0D), V(,8A,8A,0F), \
V(,,,E0), V(,3E,3E,7C), V(C4,B5,B5,), V(AA,,,CC), \
V(D8,,,), V(,,,), V(,F6,F6,F7), V(,0E,0E,1C), \
V(A3,,,C2), V(5F,,,6A), V(F9,,,AE), V(D0,B9,B9,), \
V(,,,), V(,C1,C1,), V(,1D,1D,3A), V(B9,9E,9E,), \
V(,E1,E1,D9), V(,F8,F8,EB), V(B3,,,2B), V(,,,), \
V(BB,,,D2), V(,D9,D9,A9), V(,8E,8E,), V(A7,,,), \
V(B6,9B,9B,2D), V(,1E,1E,3C), V(,,,), V(,E9,E9,C9), \
V(,CE,CE,), V(FF,,,AA), V(,,,), V(7A,DF,DF,A5), \
V(8F,8C,8C,), V(F8,A1,A1,), V(,,,), V(,0D,0D,1A), \
V(DA,BF,BF,), V(,E6,E6,D7), V(C6,,,), V(B8,,,D0), \
V(C3,,,), V(B0,,,), V(,2D,2D,5A), V(,0F,0F,1E), \
V(CB,B0,B0,7B), V(FC,,,A8), V(D6,BB,BB,6D), V(3A,,,2C) #define V(a,b,c,d) 0x##a##b##c##d
static const unsigned long FT0[] = { FT };
#undef V #define V(a,b,c,d) 0x##b##c##d##a
static const unsigned long FT1[] = { FT };
#undef V #define V(a,b,c,d) 0x##c##d##a##b
static const unsigned long FT2[] = { FT };
#undef V #define V(a,b,c,d) 0x##d##a##b##c
static const unsigned long FT3[] = { FT };
#undef V #undef FT /*
* Reverse S-box
*/
static const unsigned char RSb[] =
{
0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38,
0xBF, 0x40, 0xA3, 0x9E, 0x81, 0xF3, 0xD7, 0xFB,
0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87,
0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB,
0x54, 0x7B, 0x94, 0x32, 0xA6, 0xC2, 0x23, 0x3D,
0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E,
0x08, 0x2E, 0xA1, 0x66, 0x28, 0xD9, 0x24, 0xB2,
0x76, 0x5B, 0xA2, 0x49, 0x6D, 0x8B, 0xD1, 0x25,
0x72, 0xF8, 0xF6, 0x64, 0x86, 0x68, 0x98, 0x16,
0xD4, 0xA4, 0x5C, 0xCC, 0x5D, 0x65, 0xB6, 0x92,
0x6C, 0x70, 0x48, 0x50, 0xFD, 0xED, 0xB9, 0xDA,
0x5E, 0x15, 0x46, 0x57, 0xA7, 0x8D, 0x9D, 0x84,
0x90, 0xD8, 0xAB, 0x00, 0x8C, 0xBC, 0xD3, 0x0A,
0xF7, 0xE4, 0x58, 0x05, 0xB8, 0xB3, 0x45, 0x06,
0xD0, 0x2C, 0x1E, 0x8F, 0xCA, 0x3F, 0x0F, 0x02,
0xC1, 0xAF, 0xBD, 0x03, 0x01, 0x13, 0x8A, 0x6B,
0x3A, 0x91, 0x11, 0x41, 0x4F, 0x67, 0xDC, 0xEA,
0x97, 0xF2, 0xCF, 0xCE, 0xF0, 0xB4, 0xE6, 0x73,
0x96, 0xAC, 0x74, 0x22, 0xE7, 0xAD, 0x35, 0x85,
0xE2, 0xF9, 0x37, 0xE8, 0x1C, 0x75, 0xDF, 0x6E,
0x47, 0xF1, 0x1A, 0x71, 0x1D, 0x29, 0xC5, 0x89,
0x6F, 0xB7, 0x62, 0x0E, 0xAA, 0x18, 0xBE, 0x1B,
0xFC, 0x56, 0x3E, 0x4B, 0xC6, 0xD2, 0x79, 0x20,
0x9A, 0xDB, 0xC0, 0xFE, 0x78, 0xCD, 0x5A, 0xF4,
0x1F, 0xDD, 0xA8, 0x33, 0x88, 0x07, 0xC7, 0x31,
0xB1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xEC, 0x5F,
0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D,
0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF,
0xA0, 0xE0, 0x3B, 0x4D, 0xAE, 0x2A, 0xF5, 0xB0,
0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61,
0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26,
0xE1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0C, 0x7D
}; /*
* Reverse tables
*/
#define RT \
\
V(,A7,F4,), V(,,,7E), V(C3,A4,,1A), V(,5E,,3A), \
V(CB,6B,AB,3B), V(F1,,9D,1F), V(AB,,FA,AC), V(,,E3,4B), \
V(,FA,,), V(F6,6D,,AD), V(,,CC,), V(,4C,,F5), \
V(FC,D7,E5,4F), V(D7,CB,2A,C5), V(,,,), V(8F,A3,,B5), \
V(,5A,B1,DE), V(,1B,BA,), V(,0E,EA,), V(E1,C0,FE,5D), \
V(,,2F,C3), V(,F0,4C,), V(A3,,,8D), V(C6,F9,D3,6B), \
V(E7,5F,8F,), V(,9C,,), V(EB,7A,6D,BF), V(DA,,,), \
V(2D,,BE,D4), V(D3,,,), V(,,E0,), V(,C8,C9,8E), \
V(6A,,C2,), V(,,8E,F4), V(6B,3E,,), V(DD,,B9,), \
V(B6,4F,E1,BE), V(,AD,,F0), V(,AC,,C9), V(B4,3A,CE,7D), \
V(,4A,DF,), V(,,1A,E5), V(,,,), V(,7F,,), \
V(E0,,,B1), V(,AE,6B,BB), V(1C,A0,,FE), V(,2B,,F9), \
V(,,,), V(,FD,,8F), V(,6C,DE,), V(B7,F8,7B,), \
V(,D3,,AB), V(E2,,4B,), V(,8F,1F,E3), V(2A,AB,,), \
V(,,EB,B2), V(,C2,B5,2F), V(9A,7B,C5,), V(A5,,,D3), \
V(F2,,,), V(B2,A5,BF,), V(BA,6A,,), V(5C,,,ED), \
V(2B,1C,CF,8A), V(,B4,,A7), V(F0,F2,,F3), V(A1,E2,,4E), \
V(CD,F4,DA,), V(D5,BE,,), V(1F,,,D1), V(8A,FE,A6,C4), \
V(9D,,2E,), V(A0,,F3,A2), V(,E1,8A,), V(,EB,F6,A4), \
V(,EC,,0B), V(AA,EF,,), V(,9F,,5E), V(,,6E,BD), \
V(F9,8A,,3E), V(3D,,DD,), V(AE,,3E,DD), V(,BD,E6,4D), \
V(B5,8D,,), V(,5D,C4,), V(6F,D4,,), V(FF,,,), \
V(,FB,,), V(,E9,BD,D6), V(CC,,,), V(,9E,D9,), \
V(BD,,E8,B0), V(,8B,,), V(,5B,,E7), V(DB,EE,C8,), \
V(,0A,7C,A1), V(E9,0F,,7C), V(C9,1E,,F8), V(,,,), \
V(,,,), V(,ED,2B,), V(AC,,,1E), V(4E,,5A,6C), \
V(FB,FF,0E,FD), V(,,,0F), V(1E,D5,AE,3D), V(,,2D,), \
V(,D9,0F,0A), V(,A6,5C,), V(D1,,5B,9B), V(3A,2E,,), \
V(B1,,0A,0C), V(0F,E7,,), V(D2,,EE,B4), V(9E,,9B,1B), \
V(4F,C5,C0,), V(A2,,DC,), V(,4B,,5A), V(,1A,,1C), \
V(0A,BA,,E2), V(E5,2A,A0,C0), V(,E0,,3C), V(1D,,1B,), \
V(0B,0D,,0E), V(AD,C7,8B,F2), V(B9,A8,B6,2D), V(C8,A9,1E,), \
V(,,F1,), V(4C,,,AF), V(BB,DD,,EE), V(FD,,7F,A3), \
V(9F,,,F7), V(BC,F5,,5C), V(C5,3B,,), V(,7E,FB,5B), \
V(,,,8B), V(DC,C6,,CB), V(,FC,ED,B6), V(,F1,E4,B8), \
V(CA,DC,,D7), V(,,,), V(,,,), V(,,C6,), \
V(7D,,4A,), V(F8,3D,BB,D2), V(,,F9,AE), V(6D,A1,,C7), \
V(4B,2F,9E,1D), V(F3,,B2,DC), V(EC,,,0D), V(D0,E3,C1,), \
V(6C,,B3,2B), V(,B9,,A9), V(FA,,,), V(,,E9,), \
V(C4,8C,FC,A8), V(1A,3F,F0,A0), V(D8,2C,7D,), V(EF,,,), \
V(C7,4E,,), V(C1,D1,,D9), V(FE,A2,CA,8C), V(,0B,D4,), \
V(CF,,F5,A6), V(,DE,7A,A5), V(,8E,B7,DA), V(A4,BF,AD,3F), \
V(E4,9D,3A,2C), V(0D,,,), V(9B,CC,5F,6A), V(,,7E,), \
V(C2,,8D,F6), V(E8,B8,D8,), V(5E,F7,,2E), V(F5,AF,C3,), \
V(BE,,5D,9F), V(7C,,D0,), V(A9,2D,D5,6F), V(B3,,,CF), \
V(3B,,AC,C8), V(A7,7D,,), V(6E,,9C,E8), V(7B,BB,3B,DB), \
V(,,,CD), V(F4,,,6E), V(,B7,9A,EC), V(A8,9A,4F,), \
V(,6E,,E6), V(7E,E6,FF,AA), V(,CF,BC,), V(E6,E8,,EF), \
V(D9,9B,E7,BA), V(CE,,6F,4A), V(D4,,9F,EA), V(D6,7C,B0,), \
V(AF,B2,A4,), V(,,3F,2A), V(,,A5,C6), V(C0,,A2,), \
V(,BC,4E,), V(A6,CA,,FC), V(B0,D0,,E0), V(,D8,A7,), \
V(4A,,,F1), V(F7,DA,EC,), V(0E,,CD,7F), V(2F,F6,,), \
V(8D,D6,4D,), V(4D,B0,EF,), V(,4D,AA,CC), V(DF,,,E4), \
V(E3,B5,D1,9E), V(1B,,6A,4C), V(B8,1F,2C,C1), V(7F,,,), \
V(,EA,5E,9D), V(5D,,8C,), V(,,,FA), V(2E,,0B,FB), \
V(5A,1D,,B3), V(,D2,DB,), V(,,,E9), V(,,D6,6D), \
V(8C,,D7,9A), V(7A,0C,A1,), V(8E,,F8,), V(,3C,,EB), \
V(EE,,A9,CE), V(,C9,,B7), V(ED,E5,1C,E1), V(3C,B1,,7A), \
V(,DF,D2,9C), V(3F,,F2,), V(,CE,,), V(BF,,C7,), \
V(EA,CD,F7,), V(5B,AA,FD,5F), V(,6F,3D,DF), V(,DB,,), \
V(,F3,AF,CA), V(3E,C4,,B9), V(2C,,,), V(5F,,A3,C2), \
V(,C3,1D,), V(0C,,E2,BC), V(8B,,3C,), V(,,0D,FF), \
V(,,A8,), V(DE,B3,0C,), V(9C,E4,B4,D8), V(,C1,,), \
V(,,CB,7B), V(,B6,,D5), V(,5C,6C,), V(,,B8,D0) #define V(a,b,c,d) 0x##a##b##c##d
static const unsigned long RT0[] = { RT };
#undef V #define V(a,b,c,d) 0x##b##c##d##a
static const unsigned long RT1[] = { RT };
#undef V #define V(a,b,c,d) 0x##c##d##a##b
static const unsigned long RT2[] = { RT };
#undef V #define V(a,b,c,d) 0x##d##a##b##c
static const unsigned long RT3[] = { RT };
#undef V #undef RT /*
* Round constants
*/
static const unsigned long RCON[] =
{
0x00000001, 0x00000002, 0x00000004, 0x00000008,
0x00000010, 0x00000020, 0x00000040, 0x00000080,
0x0000001B, 0x00000036
}; #else /*
* Forward S-box & tables
*/
static unsigned char FSb[];
static unsigned long FT0[];
static unsigned long FT1[];
static unsigned long FT2[];
static unsigned long FT3[]; /*
* Reverse S-box & tables
*/
static unsigned char RSb[];
static unsigned long RT0[];
static unsigned long RT1[];
static unsigned long RT2[];
static unsigned long RT3[]; /*
* Round constants
*/
static unsigned long RCON[]; /*
* Tables generation code
*/
#define ROTL8(x) ( ( x << 8 ) & 0xFFFFFFFF ) | ( x >> 24 )
#define XTIME(x) ( ( x << 1 ) ^ ( ( x & 0x80 ) ? 0x1B : 0x00 ) )
#define MUL(x,y) ( ( x && y ) ? pow[(log[x]+log[y]) % 255] : 0 ) static int aes_init_done = ; static void aes_gen_tables( void )
{
int i, x, y, z;
int pow[];
int log[]; /*
* compute pow and log tables over GF(2^8)
*/
for( i = , x = ; i < ; i++ )
{
pow[i] = x;
log[x] = i;
x = ( x ^ XTIME( x ) ) & 0xFF;
} /*
* calculate the round constants
*/
for( i = , x = ; i < ; i++ )
{
RCON[i] = (unsigned long) x;
x = XTIME( x ) & 0xFF;
} /*
* generate the forward and reverse S-boxes
*/
FSb[0x00] = 0x63;
RSb[0x63] = 0x00; for( i = ; i < ; i++ )
{
x = pow[ - log[i]]; y = x; y = ( (y << ) | (y >> ) ) & 0xFF;
x ^= y; y = ( (y << ) | (y >> ) ) & 0xFF;
x ^= y; y = ( (y << ) | (y >> ) ) & 0xFF;
x ^= y; y = ( (y << ) | (y >> ) ) & 0xFF;
x ^= y ^ 0x63; FSb[i] = (unsigned char) x;
RSb[x] = (unsigned char) i;
} /*
* generate the forward and reverse tables
*/
for( i = ; i < ; i++ )
{
x = FSb[i];
y = XTIME( x ) & 0xFF;
z = ( y ^ x ) & 0xFF; FT0[i] = ( (unsigned long) y ) ^
( (unsigned long) x << ) ^
( (unsigned long) x << ) ^
( (unsigned long) z << ); FT1[i] = ROTL8( FT0[i] );
FT2[i] = ROTL8( FT1[i] );
FT3[i] = ROTL8( FT2[i] ); x = RSb[i]; RT0[i] = ( (unsigned long) MUL( 0x0E, x ) ) ^
( (unsigned long) MUL( 0x09, x ) << ) ^
( (unsigned long) MUL( 0x0D, x ) << ) ^
( (unsigned long) MUL( 0x0B, x ) << ); RT1[i] = ROTL8( RT0[i] );
RT2[i] = ROTL8( RT1[i] );
RT3[i] = ROTL8( RT2[i] );
}
} #endif /*
* AES key schedule (encryption)
*/
void aes_setkey_enc( aes_context *ctx, const unsigned char *key, int keysize )
{
int i;
unsigned long *RK; #if !defined(XYSSL_AES_ROM_TABLES)
if( aes_init_done == )
{
aes_gen_tables();
aes_init_done = ;
}
#endif switch( keysize )
{
case : ctx->nr = ; break;
case : ctx->nr = ; break;
case : ctx->nr = ; break;
default : return;
} #if defined(PADLOCK_ALIGN16)
ctx->rk = RK = PADLOCK_ALIGN16( ctx->buf );
#else
ctx->rk = RK = ctx->buf;
#endif for( i = ; i < (keysize >> ); i++ )
{
GET_ULONG_LE( RK[i], key, i << );
} switch( ctx->nr )
{
case : for( i = ; i < ; i++, RK += )
{
RK[] = RK[] ^ RCON[i] ^
( FSb[ ( RK[] >> ) & 0xFF ] ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] ) & 0xFF ] << ); RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
}
break; case : for( i = ; i < ; i++, RK += )
{
RK[] = RK[] ^ RCON[i] ^
( FSb[ ( RK[] >> ) & 0xFF ] ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] ) & 0xFF ] << ); RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
}
break; case : for( i = ; i < ; i++, RK += )
{
RK[] = RK[] ^ RCON[i] ^
( FSb[ ( RK[] >> ) & 0xFF ] ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] ) & 0xFF ] << ); RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[]; RK[] = RK[] ^
( FSb[ ( RK[] ) & 0xFF ] ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ) ^
( FSb[ ( RK[] >> ) & 0xFF ] << ); RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
RK[] = RK[] ^ RK[];
}
break; default: break;
}
} /*
* AES key schedule (decryption)
*/
void aes_setkey_dec( aes_context *ctx, const unsigned char *key, int keysize )
{
int i, j;
aes_context cty;
unsigned long *RK;
unsigned long *SK; switch( keysize )
{
case : ctx->nr = ; break;
case : ctx->nr = ; break;
case : ctx->nr = ; break;
default : return;
} #if defined(PADLOCK_ALIGN16)
ctx->rk = RK = PADLOCK_ALIGN16( ctx->buf );
#else
ctx->rk = RK = ctx->buf;
#endif aes_setkey_enc( &cty, key, keysize );
SK = cty.rk + cty.nr * ; *RK++ = *SK++;
*RK++ = *SK++;
*RK++ = *SK++;
*RK++ = *SK++; for( i = ctx->nr - , SK -= ; i > ; i--, SK -= )
{
for( j = ; j < ; j++, SK++ )
{
*RK++ = RT0[ FSb[ ( *SK ) & 0xFF ] ] ^
RT1[ FSb[ ( *SK >> ) & 0xFF ] ] ^
RT2[ FSb[ ( *SK >> ) & 0xFF ] ] ^
RT3[ FSb[ ( *SK >> ) & 0xFF ] ];
}
} *RK++ = *SK++;
*RK++ = *SK++;
*RK++ = *SK++;
*RK++ = *SK++; memset( &cty, , sizeof( aes_context ) );
} #define AES_FROUND(X0,X1,X2,X3,Y0,Y1,Y2,Y3) \
{ \
X0 = *RK++ ^ FT0[ ( Y0 ) & 0xFF ] ^ \
FT1[ ( Y1 >> ) & 0xFF ] ^ \
FT2[ ( Y2 >> ) & 0xFF ] ^ \
FT3[ ( Y3 >> ) & 0xFF ]; \
\
X1 = *RK++ ^ FT0[ ( Y1 ) & 0xFF ] ^ \
FT1[ ( Y2 >> ) & 0xFF ] ^ \
FT2[ ( Y3 >> ) & 0xFF ] ^ \
FT3[ ( Y0 >> ) & 0xFF ]; \
\
X2 = *RK++ ^ FT0[ ( Y2 ) & 0xFF ] ^ \
FT1[ ( Y3 >> ) & 0xFF ] ^ \
FT2[ ( Y0 >> ) & 0xFF ] ^ \
FT3[ ( Y1 >> ) & 0xFF ]; \
\
X3 = *RK++ ^ FT0[ ( Y3 ) & 0xFF ] ^ \
FT1[ ( Y0 >> ) & 0xFF ] ^ \
FT2[ ( Y1 >> ) & 0xFF ] ^ \
FT3[ ( Y2 >> ) & 0xFF ]; \
} #define AES_RROUND(X0,X1,X2,X3,Y0,Y1,Y2,Y3) \
{ \
X0 = *RK++ ^ RT0[ ( Y0 ) & 0xFF ] ^ \
RT1[ ( Y3 >> ) & 0xFF ] ^ \
RT2[ ( Y2 >> ) & 0xFF ] ^ \
RT3[ ( Y1 >> ) & 0xFF ]; \
\
X1 = *RK++ ^ RT0[ ( Y1 ) & 0xFF ] ^ \
RT1[ ( Y0 >> ) & 0xFF ] ^ \
RT2[ ( Y3 >> ) & 0xFF ] ^ \
RT3[ ( Y2 >> ) & 0xFF ]; \
\
X2 = *RK++ ^ RT0[ ( Y2 ) & 0xFF ] ^ \
RT1[ ( Y1 >> ) & 0xFF ] ^ \
RT2[ ( Y0 >> ) & 0xFF ] ^ \
RT3[ ( Y3 >> ) & 0xFF ]; \
\
X3 = *RK++ ^ RT0[ ( Y3 ) & 0xFF ] ^ \
RT1[ ( Y2 >> ) & 0xFF ] ^ \
RT2[ ( Y1 >> ) & 0xFF ] ^ \
RT3[ ( Y0 >> ) & 0xFF ]; \
} /*
* AES-ECB block encryption/decryption
*/
void aes_crypt_ecb( aes_context *ctx,
int mode,
const unsigned char input[],
unsigned char output[] )
{
int i;
unsigned long *RK, X0, X1, X2, X3, Y0, Y1, Y2, Y3; #if defined(XYSSL_PADLOCK_C) && defined(XYSSL_HAVE_X86)
if( padlock_supports( PADLOCK_ACE ) )
{
if( padlock_xcryptecb( ctx, mode, input, output ) == )
return;
}
#endif RK = ctx->rk; GET_ULONG_LE( X0, input, ); X0 ^= *RK++;
GET_ULONG_LE( X1, input, ); X1 ^= *RK++;
GET_ULONG_LE( X2, input, ); X2 ^= *RK++;
GET_ULONG_LE( X3, input, ); X3 ^= *RK++; if( mode == AES_DECRYPT )
{
for( i = (ctx->nr >> ) - ; i > ; i-- )
{
AES_RROUND( Y0, Y1, Y2, Y3, X0, X1, X2, X3 );
AES_RROUND( X0, X1, X2, X3, Y0, Y1, Y2, Y3 );
} AES_RROUND( Y0, Y1, Y2, Y3, X0, X1, X2, X3 ); X0 = *RK++ ^ ( RSb[ ( Y0 ) & 0xFF ] ) ^
( RSb[ ( Y3 >> ) & 0xFF ] << ) ^
( RSb[ ( Y2 >> ) & 0xFF ] << ) ^
( RSb[ ( Y1 >> ) & 0xFF ] << ); X1 = *RK++ ^ ( RSb[ ( Y1 ) & 0xFF ] ) ^
( RSb[ ( Y0 >> ) & 0xFF ] << ) ^
( RSb[ ( Y3 >> ) & 0xFF ] << ) ^
( RSb[ ( Y2 >> ) & 0xFF ] << ); X2 = *RK++ ^ ( RSb[ ( Y2 ) & 0xFF ] ) ^
( RSb[ ( Y1 >> ) & 0xFF ] << ) ^
( RSb[ ( Y0 >> ) & 0xFF ] << ) ^
( RSb[ ( Y3 >> ) & 0xFF ] << ); X3 = *RK++ ^ ( RSb[ ( Y3 ) & 0xFF ] ) ^
( RSb[ ( Y2 >> ) & 0xFF ] << ) ^
( RSb[ ( Y1 >> ) & 0xFF ] << ) ^
( RSb[ ( Y0 >> ) & 0xFF ] << );
}
else /* AES_ENCRYPT */
{
for( i = (ctx->nr >> ) - ; i > ; i-- )
{
AES_FROUND( Y0, Y1, Y2, Y3, X0, X1, X2, X3 );
AES_FROUND( X0, X1, X2, X3, Y0, Y1, Y2, Y3 );
} AES_FROUND( Y0, Y1, Y2, Y3, X0, X1, X2, X3 ); X0 = *RK++ ^ ( FSb[ ( Y0 ) & 0xFF ] ) ^
( FSb[ ( Y1 >> ) & 0xFF ] << ) ^
( FSb[ ( Y2 >> ) & 0xFF ] << ) ^
( FSb[ ( Y3 >> ) & 0xFF ] << ); X1 = *RK++ ^ ( FSb[ ( Y1 ) & 0xFF ] ) ^
( FSb[ ( Y2 >> ) & 0xFF ] << ) ^
( FSb[ ( Y3 >> ) & 0xFF ] << ) ^
( FSb[ ( Y0 >> ) & 0xFF ] << ); X2 = *RK++ ^ ( FSb[ ( Y2 ) & 0xFF ] ) ^
( FSb[ ( Y3 >> ) & 0xFF ] << ) ^
( FSb[ ( Y0 >> ) & 0xFF ] << ) ^
( FSb[ ( Y1 >> ) & 0xFF ] << ); X3 = *RK++ ^ ( FSb[ ( Y3 ) & 0xFF ] ) ^
( FSb[ ( Y0 >> ) & 0xFF ] << ) ^
( FSb[ ( Y1 >> ) & 0xFF ] << ) ^
( FSb[ ( Y2 >> ) & 0xFF ] << );
} PUT_ULONG_LE( X0, output, );
PUT_ULONG_LE( X1, output, );
PUT_ULONG_LE( X2, output, );
PUT_ULONG_LE( X3, output, );
} /*
* AES-CBC buffer encryption/decryption
*/
void aes_crypt_cbc( aes_context *ctx,
int mode,
int length,
unsigned char iv[],
const unsigned char *input,
unsigned char *output )
{
int i;
unsigned char temp[]; #if defined(XYSSL_PADLOCK_C) && defined(XYSSL_HAVE_X86)
if( padlock_supports( PADLOCK_ACE ) )
{
if( padlock_xcryptcbc( ctx, mode, length, iv, input, output ) == )
return;
}
#endif if( mode == AES_DECRYPT )
{
while( length > )
{
memcpy( temp, input, );
aes_crypt_ecb( ctx, mode, input, output ); for( i = ; i < ; i++ )
output[i] = (unsigned char)( output[i] ^ iv[i] ); memcpy( iv, temp, ); input += ;
output += ;
length -= ;
}
}
else
{
while( length > )
{
for( i = ; i < ; i++ )
output[i] = (unsigned char)( input[i] ^ iv[i] ); aes_crypt_ecb( ctx, mode, output, output );
memcpy( iv, output, ); input += ;
output += ;
length -= ;
}
}
} /*
* AES-CFB buffer encryption/decryption
*/
void aes_crypt_cfb( aes_context *ctx,
int mode,
int length,
int *iv_off,
unsigned char iv[],
const unsigned char *input,
unsigned char *output )
{
int c, n = *iv_off; if( mode == AES_DECRYPT )
{
while( length-- )
{
if( n == )
aes_crypt_ecb( ctx, AES_ENCRYPT, iv, iv ); c = *input++;
*output++ = (unsigned char)( c ^ iv[n] );
iv[n] = (unsigned char) c; n = (n + ) & 0x0F;
}
}
else
{
while( length-- )
{
if( n == )
aes_crypt_ecb( ctx, AES_ENCRYPT, iv, iv ); iv[n] = *output++ = (unsigned char)( iv[n] ^ *input++ ); n = (n + ) & 0x0F;
}
} *iv_off = n;
} #if defined(XYSSL_SELF_TEST) #include <stdio.h> /*
* AES test vectors from:
*
* http://csrc.nist.gov/archive/aes/rijndael/rijndael-vals.zip
*/
static const unsigned char aes_test_ecb_dec[][] =
{
{ 0x44, 0x41, 0x6A, 0xC2, 0xD1, 0xF5, 0x3C, 0x58,
0x33, 0x03, 0x91, 0x7E, 0x6B, 0xE9, 0xEB, 0xE0 },
{ 0x48, 0xE3, 0x1E, 0x9E, 0x25, 0x67, 0x18, 0xF2,
0x92, 0x29, 0x31, 0x9C, 0x19, 0xF1, 0x5B, 0xA4 },
{ 0x05, 0x8C, 0xCF, 0xFD, 0xBB, 0xCB, 0x38, 0x2D,
0x1F, 0x6F, 0x56, 0x58, 0x5D, 0x8A, 0x4A, 0xDE }
}; static const unsigned char aes_test_ecb_enc[][] =
{
{ 0xC3, 0x4C, 0x05, 0x2C, 0xC0, 0xDA, 0x8D, 0x73,
0x45, 0x1A, 0xFE, 0x5F, 0x03, 0xBE, 0x29, 0x7F },
{ 0xF3, 0xF6, 0x75, 0x2A, 0xE8, 0xD7, 0x83, 0x11,
0x38, 0xF0, 0x41, 0x56, 0x06, 0x31, 0xB1, 0x14 },
{ 0x8B, 0x79, 0xEE, 0xCC, 0x93, 0xA0, 0xEE, 0x5D,
0xFF, 0x30, 0xB4, 0xEA, 0x21, 0x63, 0x6D, 0xA4 }
}; static const unsigned char aes_test_cbc_dec[][] =
{
{ 0xFA, 0xCA, 0x37, 0xE0, 0xB0, 0xC8, 0x53, 0x73,
0xDF, 0x70, 0x6E, 0x73, 0xF7, 0xC9, 0xAF, 0x86 },
{ 0x5D, 0xF6, 0x78, 0xDD, 0x17, 0xBA, 0x4E, 0x75,
0xB6, 0x17, 0x68, 0xC6, 0xAD, 0xEF, 0x7C, 0x7B },
{ 0x48, 0x04, 0xE1, 0x81, 0x8F, 0xE6, 0x29, 0x75,
0x19, 0xA3, 0xE8, 0x8C, 0x57, 0x31, 0x04, 0x13 }
}; static const unsigned char aes_test_cbc_enc[][] =
{
{ 0x8A, 0x05, 0xFC, 0x5E, 0x09, 0x5A, 0xF4, 0x84,
0x8A, 0x08, 0xD3, 0x28, 0xD3, 0x68, 0x8E, 0x3D },
{ 0x7B, 0xD9, 0x66, 0xD5, 0x3A, 0xD8, 0xC1, 0xBB,
0x85, 0xD2, 0xAD, 0xFA, 0xE8, 0x7B, 0xB1, 0x04 },
{ 0xFE, 0x3C, 0x53, 0x65, 0x3E, 0x2F, 0x45, 0xB5,
0x6F, 0xCD, 0x88, 0xB2, 0xCC, 0x89, 0x8F, 0xF0 }
}; /*
* AES-CFB test vectors (generated on 2008-02-12)
*/
static const unsigned char aes_test_cfb_dec[][] =
{
{ 0xBA, 0x75, 0x0C, 0xC9, 0x77, 0xF8, 0xD4, 0xE1,
0x3E, 0x0F, 0xB5, 0x46, 0x2E, 0xA6, 0x33, 0xF6 },
{ 0xDB, 0x40, 0x4A, 0x98, 0x7B, 0xAA, 0xA3, 0xF3,
0x92, 0x35, 0xAD, 0x58, 0x09, 0x9B, 0xFF, 0x6E },
{ 0xA8, 0x17, 0x41, 0x0E, 0x76, 0x71, 0x60, 0xE5,
0xFD, 0x37, 0xC5, 0x43, 0xCC, 0xC8, 0xD6, 0xDA }
}; static const unsigned char aes_test_cfb_enc[][] =
{
{ 0x45, 0x62, 0xC5, 0xA1, 0xF9, 0x10, 0x8F, 0xE0,
0x87, 0x24, 0x25, 0x68, 0xB5, 0x12, 0xF3, 0x8B },
{ 0xB8, 0xD4, 0xD5, 0x09, 0xF5, 0xEE, 0x08, 0x38,
0x48, 0x9B, 0x9D, 0xAD, 0x11, 0xB4, 0x2E, 0xD2 },
{ 0xE9, 0x10, 0x80, 0xDA, 0xEE, 0x2D, 0x81, 0xD9,
0x41, 0x78, 0x91, 0xD5, 0x98, 0x78, 0xE1, 0xFA }
}; /*
* Checkup routine
*/
int aes_self_test( int verbose )
{
int i, j, u, v, offset;
unsigned char key[];
unsigned char buf[];
unsigned char prv[];
unsigned char iv[];
aes_context ctx; memset( key, , ); /*
* ECB mode
*/
for( i = ; i < ; i++ )
{
u = i >> ;
v = i & ; if( verbose != )
printf( " AES-ECB-%3d (%s): ", + u * ,
( v == AES_DECRYPT ) ? "dec" : "enc" ); memset( buf, , ); if( v == AES_DECRYPT )
{
aes_setkey_dec( &ctx, key, + u * ); for( j = ; j < ; j++ )
aes_crypt_ecb( &ctx, v, buf, buf ); if( memcmp( buf, aes_test_ecb_dec[u], ) != )
{
if( verbose != )
printf( "failed\n" ); return( );
}
}
else
{
aes_setkey_enc( &ctx, key, + u * ); for( j = ; j < ; j++ )
aes_crypt_ecb( &ctx, v, buf, buf ); if( memcmp( buf, aes_test_ecb_enc[u], ) != )
{
if( verbose != )
printf( "failed\n" ); return( );
}
} if( verbose != )
printf( "passed\n" );
} if( verbose != )
printf( "\n" ); /*
* CBC mode
*/
for( i = ; i < ; i++ )
{
u = i >> ;
v = i & ; if( verbose != )
printf( " AES-CBC-%3d (%s): ", + u * ,
( v == AES_DECRYPT ) ? "dec" : "enc" ); memset( iv , , );
memset( prv, , );
memset( buf, , ); if( v == AES_DECRYPT )
{
aes_setkey_dec( &ctx, key, + u * ); for( j = ; j < ; j++ )
aes_crypt_cbc( &ctx, v, , iv, buf, buf ); if( memcmp( buf, aes_test_cbc_dec[u], ) != )
{
if( verbose != )
printf( "failed\n" ); return( );
}
}
else
{
aes_setkey_enc( &ctx, key, + u * ); for( j = ; j < ; j++ )
{
unsigned char tmp[]; aes_crypt_cbc( &ctx, v, , iv, buf, buf ); memcpy( tmp, prv, );
memcpy( prv, buf, );
memcpy( buf, tmp, );
} if( memcmp( prv, aes_test_cbc_enc[u], ) != )
{
if( verbose != )
printf( "failed\n" ); return( );
}
} if( verbose != )
printf( "passed\n" );
} if( verbose != )
printf( "\n" ); /*
* CFB mode
*/
for( i = ; i < ; i++ )
{
u = i >> ;
v = i & ; if( verbose != )
printf( " AES-CFB-%3d (%s): ", + u * ,
( v == AES_DECRYPT ) ? "dec" : "enc" ); memset( iv , , );
memset( buf, , );
offset = ; if( v == AES_DECRYPT )
{
aes_setkey_dec( &ctx, key, + u * ); for( j = ; j < ; j++ )
aes_crypt_cfb( &ctx, v, , &offset, iv, buf, buf ); if( memcmp( buf, aes_test_cfb_dec[u], ) != )
{
if( verbose != )
printf( "failed\n" ); return( );
}
}
else
{
aes_setkey_enc( &ctx, key, + u * ); for( j = ; j < ; j++ )
aes_crypt_cfb( &ctx, v, , &offset, iv, buf, buf ); if( memcmp( buf, aes_test_cfb_enc[u], ) != )
{
if( verbose != )
printf( "failed\n" ); return( );
}
} if( verbose != )
printf( "passed\n" );
} if( verbose != )
printf( "\n" ); return( );
} int main(int argc, char *argv[])
{
return aes_self_test();
} #endif /* defined(XYSSL_SELF_TEST) */

AES advanced encryption standard 2的更多相关文章

  1. AES advanced encryption standard

    // advanced encryption standard // author: karl malbrain, malbrain@yahoo.com typedef unsigned char u ...

  2. AES advanced encryption standard 3

    This optimized <../aesbench/> AES implementation conforms to FIPS-. aes.h #ifndef _AES_H #defi ...

  3. java AES 加密解密工具(Advanced Encryption Standard)发现明文相同但每次重启服务后密文就会不同于是有了改进

    1.通用方法 package com.qlkj.hzd.commom.utils; import javax.crypto.*; import java.io.UnsupportedEncodingE ...

  4. ECC(Ellipse Curve Cryptography)+AES(Advanced Encryption Standard)前端通讯加密模拟(使用eccrypto-js)

    前置知识 不了解对称加密与非对称加密的小伙伴可以看看下面的文章,想详细学习与区块链有关的加密算法可以戳这里 对称与非对称加密 https://blog.csdn.net/u013320868/arti ...

  5. 高级加密标准(英语:Advanced Encryption Standard,缩写:AES)

    2006年,高级加密标准已然成为对称密钥加密中最流行的算法之一.

  6. 目前常用的加密算法有DES(Data Encryption Standard)和IDEA(International Data Encryption Algorithm)国际数据加密算法等,请用工厂方法实现加密算法系统。提交该系统的代码,该系统务必是一个可以能够直接使用的系统,查阅资料完成相应加密算法的实现;

    1.加密算法的类图结构 2.源代码 2.1代码运行截图 2.2代码的目录结构 2.3具体代码 MethodFactory.java package jiami; public interface Me ...

  7. DES(Data Encryption Standard)数据加密标准

    DES算法入口参数 DES算法的入口参数有三个:Key.Data.Mode.其中Key为7个字节共56位,是DES算法的工作密钥.Data为8个字节64位,是要被加密或解密的数据;Mode为DES的工 ...

  8. DES,3DES,AES这三种对称密钥的区别与联系

    DES:Data Encryption Standard(数据加密标准,又美国国密局,选中的IBM的方案,密钥长度为56,标准提出是要使用64位长的密钥,但是实际中DES算法只用了64位中的56位密钥 ...

  9. Node 实现 AES 加密,结果输出为“byte”。

    Node 实现 AES 加密,结果输出为"byte". 最近做个需求,对接一个平台的接口,该平台采用 AES (Advanced Encryption Standard)加密算法, ...

随机推荐

  1. day03作业

    ---恢复内容开始--- 1.+.-.*./.%.++.-- ①正号:②加法运算:③连接符 除法是两个数相除所得的结果,取余是除法操作的余数. ++前置表示现将一个数自加然后进行赋值,++后置表示先赋 ...

  2. C语言位域——精妙使用内存

    参考链接  https://blog.csdn.net/yanbober/article/details/8697967  https://blog.csdn.net/Tommy_wxie/artic ...

  3. 数据库中INFORMATION_SCHEMA的说明及使用

    第一个查询看看库里有多少个表,表名等select * from INFORMATION_SCHEMA.TABLES information_schema这张数据表保存了MySQL服务器所有数据库的信息 ...

  4. MySQL学习笔记:delete from与truncate table的区别

    在Mysql数据库的使用过程中,删除表数据可以通过以下2种方式: delete from table_name truncate table table_name (1)delete from语句可以 ...

  5. Java深度复制List内容。

    最近在工作的时候,有一个小需求,需要复制List的内容,然后会改变其中的数据,但是试了几种复制的方法,都是将原有的数据和复制后的数据都改变了,都没有达到我想要的效果. 其中涉及到了 "浅复制 ...

  6. php安装amqp扩展

    1.要安装AMQP PHP扩展,必须先安装librabbitmq库 1.1使用以下步骤下载并安装库: # 下载 git clone git://github.com/alanxz/rabbitmq-c ...

  7. 安装配置SVN

    官网下载地址,下载完之后如果想看到中文,可以下载语言包进行安装,安装之后TortoiseSVN -> Settings -> General -> Language选项中选择:中文( ...

  8. Hadoop自定义类型处理手机上网日志

    job提交源码分析 在eclipse中的写的代码如何提交作业到JobTracker中的哪?(1)在eclipse中调用的job.waitForCompletion(true)实际上执行如下方法 con ...

  9. 8-10 Coping Books uva714

    题意:把一个包含m个正整数的序列划分为k个   1<=k<=m<=500的非空连续子序列  使得每个正整数恰好属于一个序列  设第i个序列的各个数之和为 Si   你的任务是让所有的 ...

  10. 【定时任务】Timer

    Java原生api Timer类就可以实现简单的定时任务.下面将简单介绍一下Timer. 一.使用 Timer 实现定时任务 具体代码如下. 可以看到我们主要是分三步进行的 1.new Timer() ...