1 /* aes_keyschedule.c */
3 This file is part of the Crypto-avr-lib/microcrypt-lib.
4 Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)
6 This program is free software: you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation, either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 * \file aes_keyschedule.c
21 * \email daniel.otte@rub.de
24 * \license GPLv3 or later
31 #include "aes_keyschedule.h"
34 #include <avr/pgmspace.h>
37 void aes_rotword(void* a){
40 ((uint8_t*)a)[0] = ((uint8_t*)a)[1];
41 ((uint8_t*)a)[1] = ((uint8_t*)a)[2];
42 ((uint8_t*)a)[2] = ((uint8_t*)a)[3];
48 void aes_init(const void* key, uint16_t keysize_b, aes_genctx_t* ctx){
54 memcpy(ctx, key, keysize_b/8);
57 *((uint32_t*)tmp) = ((uint32_t*)(ctx->key[0].ks))[i-1];
58 // uart_putstr_P(PSTR("\r\nDBG: tmp = "));
59 // uart_hexdump(tmp, 4);
62 tmp[0] = pgm_read_byte(aes_sbox+tmp[0]);
63 tmp[1] = pgm_read_byte(aes_sbox+tmp[1]);
64 tmp[2] = pgm_read_byte(aes_sbox+tmp[2]);
65 tmp[3] = pgm_read_byte(aes_sbox+tmp[3]);
66 // uart_putstr_P(PSTR("\r\nDBG: after sub = "));
67 // uart_hexdump(tmp, 4);
71 // uart_putstr_P(PSTR("\r\nDBG: after rot = "));
72 // uart_hexdump(tmp, 4);
73 tmp[0] = pgm_read_byte(aes_sbox+tmp[0]);
74 tmp[1] = pgm_read_byte(aes_sbox+tmp[1]);
75 tmp[2] = pgm_read_byte(aes_sbox+tmp[2]);
76 tmp[3] = pgm_read_byte(aes_sbox+tmp[3]);
77 // uart_putstr_P(PSTR("\r\nDBG: after sub = "));
78 // uart_hexdump(tmp, 4);
80 // uart_putstr_P(PSTR("\r\nDBG: after xor RC = "));
81 // uart_hexdump(tmp, 4);
82 rc = gf256mul(2,rc,0x1b);
84 ((uint32_t*)(ctx->key[0].ks))[i] = ((uint32_t*)(ctx->key[0].ks))[i-nk]
89 for(i=0; i<nk+7; ++i){
90 memcpy(buffer, ctx->key[i].ks, 16);
91 aes_buffer2state(ctx->key[i].ks, buffer);
95 void aes128_init(const void* key, aes128_ctx_t* ctx){
96 aes_init(key, 128, (aes_genctx_t*)ctx);
99 void aes192_init(const void* key, aes192_ctx_t* ctx){
100 aes_init(key, 192, (aes_genctx_t*)ctx);
103 void aes256_init(const void* key, aes256_ctx_t* ctx){
104 aes_init(key, 256, (aes_genctx_t*)ctx);