Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
131e064e
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
131e064e
编写于
12月 26, 2004
作者:
A
Andy Polyakov
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Eliminate redundant memcpy of IV material. Performance improvement varies
from platform to platform and can be as large as 20%.
上级
556b8f3f
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
25 addition
and
7 deletion
+25
-7
crypto/aes/aes_cbc.c
crypto/aes/aes_cbc.c
+25
-7
未找到文件。
crypto/aes/aes_cbc.c
浏览文件 @
131e064e
...
...
@@ -65,7 +65,7 @@ void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
unsigned
long
n
;
unsigned
long
len
=
length
;
unsigned
char
tmp
[
AES_BLOCK_SIZE
];
unsigned
char
tmp
[
AES_BLOCK_SIZE
]
,
*
iv
=
ivec
;
assert
(
in
&&
out
&&
key
&&
ivec
);
assert
((
AES_ENCRYPT
==
enc
)
||
(
AES_DECRYPT
==
enc
));
...
...
@@ -73,22 +73,40 @@ void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
if
(
AES_ENCRYPT
==
enc
)
{
while
(
len
>=
AES_BLOCK_SIZE
)
{
for
(
n
=
0
;
n
<
AES_BLOCK_SIZE
;
++
n
)
tmp
[
n
]
=
in
[
n
]
^
ivec
[
n
];
AES_encrypt
(
tmp
,
out
,
key
);
memcpy
(
ivec
,
out
,
AES_BLOCK_SIZE
)
;
out
[
n
]
=
in
[
n
]
^
iv
[
n
];
AES_encrypt
(
out
,
out
,
key
);
iv
=
out
;
len
-=
AES_BLOCK_SIZE
;
in
+=
AES_BLOCK_SIZE
;
out
+=
AES_BLOCK_SIZE
;
}
if
(
len
)
{
for
(
n
=
0
;
n
<
len
;
++
n
)
tmp
[
n
]
=
in
[
n
]
^
iv
ec
[
n
];
tmp
[
n
]
=
in
[
n
]
^
iv
[
n
];
for
(
n
=
len
;
n
<
AES_BLOCK_SIZE
;
++
n
)
tmp
[
n
]
=
iv
ec
[
n
];
tmp
[
n
]
=
iv
[
n
];
AES_encrypt
(
tmp
,
tmp
,
key
);
memcpy
(
out
,
tmp
,
AES_BLOCK_SIZE
);
memcpy
(
ivec
,
tmp
,
AES_BLOCK_SIZE
)
;
iv
=
out
;
}
memcpy
(
ivec
,
iv
,
AES_BLOCK_SIZE
);
}
else
if
(
in
!=
out
)
{
while
(
len
>=
AES_BLOCK_SIZE
)
{
AES_decrypt
(
in
,
out
,
key
);
for
(
n
=
0
;
n
<
AES_BLOCK_SIZE
;
++
n
)
out
[
n
]
^=
iv
[
n
];
iv
=
in
;
len
-=
AES_BLOCK_SIZE
;
in
+=
AES_BLOCK_SIZE
;
out
+=
AES_BLOCK_SIZE
;
}
if
(
len
)
{
AES_decrypt
(
in
,
tmp
,
key
);
for
(
n
=
0
;
n
<
len
;
++
n
)
out
[
n
]
=
tmp
[
n
]
^
iv
[
n
];
iv
=
in
;
}
memcpy
(
ivec
,
iv
,
AES_BLOCK_SIZE
);
}
else
{
while
(
len
>=
AES_BLOCK_SIZE
)
{
memcpy
(
tmp
,
in
,
AES_BLOCK_SIZE
);
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录