[tidy-exports] properly prefix gf_mul(x)

This commit is contained in:
Vincent Hanquez 2015-06-21 15:11:02 +01:00
parent 03074526d6
commit e6d3518c2e
3 changed files with 48 additions and 48 deletions

View File

@ -39,7 +39,7 @@
* to speed up the multiplication. * to speed up the multiplication.
* TODO: optimise with tables * TODO: optimise with tables
*/ */
void gf_mul(block128 *a, block128 *b) void cryptonite_gf_mul(block128 *a, block128 *b)
{ {
uint64_t a0, a1, v0, v1; uint64_t a0, a1, v0, v1;
int i, j; int i, j;
@ -62,7 +62,7 @@ void gf_mul(block128 *a, block128 *b)
} }
/* inplace GFMUL for xts mode */ /* inplace GFMUL for xts mode */
void gf_mulx(block128 *a) void cryptonite_gf_mulx(block128 *a)
{ {
const uint64_t gf_mask = cpu_to_le64(0x8000000000000000ULL); const uint64_t gf_mask = cpu_to_le64(0x8000000000000000ULL);
uint64_t r = ((a->q[1] & gf_mask) ? cpu_to_le64(0x87) : 0); uint64_t r = ((a->q[1] & gf_mask) ? cpu_to_le64(0x87) : 0);

View File

@ -32,7 +32,7 @@
#include "aes/block128.h" #include "aes/block128.h"
void gf_mul(block128 *a, block128 *b); void cryptonite_gf_mul(block128 *a, block128 *b);
void gf_mulx(block128 *a); void cryptonite_gf_mulx(block128 *a);
#endif #endif

View File

@ -336,7 +336,7 @@ void cryptonite_aes_ocb_decrypt(uint8_t *output, aes_ocb *ocb, aes_key *key, uin
static void gcm_ghash_add(aes_gcm *gcm, block128 *b) static void gcm_ghash_add(aes_gcm *gcm, block128 *b)
{ {
block128_xor(&gcm->tag, b); block128_xor(&gcm->tag, b);
gf_mul(&gcm->tag, &gcm->h); cryptonite_gf_mul(&gcm->tag, &gcm->h);
} }
void cryptonite_aes_gcm_init(aes_gcm *gcm, aes_key *key, uint8_t *iv, uint32_t len) void cryptonite_aes_gcm_init(aes_gcm *gcm, aes_key *key, uint8_t *iv, uint32_t len)
@ -359,15 +359,15 @@ void cryptonite_aes_gcm_init(aes_gcm *gcm, aes_key *key, uint8_t *iv, uint32_t l
int i; int i;
for (; len >= 16; len -= 16, iv += 16) { for (; len >= 16; len -= 16, iv += 16) {
block128_xor(&gcm->iv, (block128 *) iv); block128_xor(&gcm->iv, (block128 *) iv);
gf_mul(&gcm->iv, &gcm->h); cryptonite_gf_mul(&gcm->iv, &gcm->h);
} }
if (len > 0) { if (len > 0) {
block128_xor_bytes(&gcm->iv, iv, len); block128_xor_bytes(&gcm->iv, iv, len);
gf_mul(&gcm->iv, &gcm->h); cryptonite_gf_mul(&gcm->iv, &gcm->h);
} }
for (i = 15; origlen; --i, origlen >>= 8) for (i = 15; origlen; --i, origlen >>= 8)
gcm->iv.b[i] ^= (uint8_t) origlen; gcm->iv.b[i] ^= (uint8_t) origlen;
gf_mul(&gcm->iv, &gcm->h); cryptonite_gf_mul(&gcm->iv, &gcm->h);
} }
block128_copy(&gcm->civ, &gcm->iv); block128_copy(&gcm->civ, &gcm->iv);
@ -596,9 +596,9 @@ void cryptonite_aes_generic_encrypt_xts(aes_block *output, aes_key *k1, aes_key
/* TO OPTIMISE: this is really inefficient way to do that */ /* TO OPTIMISE: this is really inefficient way to do that */
while (spoint-- > 0) while (spoint-- > 0)
gf_mulx(&tweak); cryptonite_gf_mulx(&tweak);
for ( ; nb_blocks-- > 0; input++, output++, gf_mulx(&tweak)) { for ( ; nb_blocks-- > 0; input++, output++, cryptonite_gf_mulx(&tweak)) {
block128_vxor(&block, input, &tweak); block128_vxor(&block, input, &tweak);
cryptonite_aes_encrypt_block(&block, k1, &block); cryptonite_aes_encrypt_block(&block, k1, &block);
block128_vxor(output, &block, &tweak); block128_vxor(output, &block, &tweak);
@ -616,9 +616,9 @@ void cryptonite_aes_generic_decrypt_xts(aes_block *output, aes_key *k1, aes_key
/* TO OPTIMISE: this is really inefficient way to do that */ /* TO OPTIMISE: this is really inefficient way to do that */
while (spoint-- > 0) while (spoint-- > 0)
gf_mulx(&tweak); cryptonite_gf_mulx(&tweak);
for ( ; nb_blocks-- > 0; input++, output++, gf_mulx(&tweak)) { for ( ; nb_blocks-- > 0; input++, output++, cryptonite_gf_mulx(&tweak)) {
block128_vxor(&block, input, &tweak); block128_vxor(&block, input, &tweak);
cryptonite_aes_decrypt_block(&block, k1, &block); cryptonite_aes_decrypt_block(&block, k1, &block);
block128_vxor(output, &block, &tweak); block128_vxor(output, &block, &tweak);