X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=groestl%2Fgroestl_large.c;h=0812683357c2f33fb57307b701e4e5b0629a0c7a;hb=41e9e95f07e04170b8732426b2c5d73400b4a2bd;hp=322e1c6e2678afc59e4f145571e2b665e72b7566;hpb=7b5401ab9ce23a5da1de8b6c7de3a1aa20ac4cf8;p=avr-crypto-lib.git diff --git a/groestl/groestl_large.c b/groestl/groestl_large.c index 322e1c6..0812683 100644 --- a/groestl/groestl_large.c +++ b/groestl/groestl_large.c @@ -26,9 +26,9 @@ */ #include "groestl_large.h" -#include "aes/aes_sbox.h" -#include "gf256mul/gf256mul.h" -#include "memxor/memxor.h" +#include "aes_sbox.h" +#include "gf256mul.h" +#include "memxor.h" #include #include #include @@ -65,14 +65,49 @@ static uint8_t matrix[] PROGMEM = { 2, 3, 4, 5, 3, 5, 7, 2 }; +static +void shift_columns(uint8_t *a, PGM_VOID_P shifts){ + uint8_t s; + uint8_t tmp[16]; + uint8_t i,j; + for(i=0; i<8; ++i){ + s = pgm_read_byte(shifts); + shifts = (uint8_t*)shifts + 1; + if(s==0){ + continue; + } + for(j=0;j<16;++j){ + tmp[j] = a[i+j*8]; + } + for(j=0; j<16; ++j){ + a[i+((j-s+16)%16)*8] = tmp[j]; + } + } +} + +static const uint8_t p_shifts[] PROGMEM = { + 0, 1, 2, 3, 4, 5, 6, 11 +}; + +static const uint8_t q_shifts[] PROGMEM = { + 1, 3, 5, 11, 0, 2, 4, 6 +}; + void groestl_large_rounds(uint8_t *m, uint8_t q){ uint8_t r,i,j; uint8_t tmp[16]; for(r=0; r