OLD | NEW |
(Empty) | |
| 1 /* |
| 2 * gf2_8.c |
| 3 * |
| 4 * GF(256) finite field implementation, with the representation used |
| 5 * in the AES cipher. |
| 6 * |
| 7 * David A. McGrew |
| 8 * Cisco Systems, Inc. |
| 9 */ |
| 10 |
| 11 /* |
| 12 * |
| 13 * Copyright (c) 2001-2006, Cisco Systems, Inc. |
| 14 * All rights reserved. |
| 15 * |
| 16 * Redistribution and use in source and binary forms, with or without |
| 17 * modification, are permitted provided that the following conditions |
| 18 * are met: |
| 19 * |
| 20 * Redistributions of source code must retain the above copyright |
| 21 * notice, this list of conditions and the following disclaimer. |
| 22 * |
| 23 * Redistributions in binary form must reproduce the above |
| 24 * copyright notice, this list of conditions and the following |
| 25 * disclaimer in the documentation and/or other materials provided |
| 26 * with the distribution. |
| 27 * |
| 28 * Neither the name of the Cisco Systems, Inc. nor the names of its |
| 29 * contributors may be used to endorse or promote products derived |
| 30 * from this software without specific prior written permission. |
| 31 * |
| 32 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| 33 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| 34 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
| 35 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE |
| 36 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, |
| 37 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
| 38 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR |
| 39 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 40 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| 41 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| 42 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| 43 * OF THE POSSIBILITY OF SUCH DAMAGE. |
| 44 * |
| 45 */ |
| 46 |
| 47 |
| 48 #include "datatypes.h" |
| 49 #include "gf2_8.h" |
| 50 |
| 51 /* gf2_8_shift() moved to gf2_8.h as an inline function */ |
| 52 |
| 53 inline gf2_8 |
| 54 gf2_8_multiply(gf2_8 x, gf2_8 y) { |
| 55 gf2_8 z = 0; |
| 56 |
| 57 if (y & 1) z ^= x; x = gf2_8_shift(x); |
| 58 if (y & 2) z ^= x; x = gf2_8_shift(x); |
| 59 if (y & 4) z ^= x; x = gf2_8_shift(x); |
| 60 if (y & 8) z ^= x; x = gf2_8_shift(x); |
| 61 if (y & 16) z ^= x; x = gf2_8_shift(x); |
| 62 if (y & 32) z ^= x; x = gf2_8_shift(x); |
| 63 if (y & 64) z ^= x; x = gf2_8_shift(x); |
| 64 if (y & 128) z ^= x; |
| 65 |
| 66 return z; |
| 67 } |
| 68 |
| 69 |
| 70 /* this should use the euclidean algorithm */ |
| 71 |
| 72 gf2_8 |
| 73 gf2_8_compute_inverse(gf2_8 x) { |
| 74 unsigned int i; |
| 75 |
| 76 if (x == 0) return 0; /* zero is a special case */ |
| 77 for (i=0; i < 256; i++) |
| 78 if (gf2_8_multiply((gf2_8) i, x) == 1) |
| 79 return (gf2_8) i; |
| 80 |
| 81 return 0; |
| 82 } |
| 83 |
OLD | NEW |