Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
b4f2a462
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
10 个月 前同步成功
通知
8
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
前往新版Gitcode,体验更适合开发者的 AI 搜索 >>
提交
b4f2a462
编写于
6月 30, 2017
作者:
A
Andy Polyakov
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
sha/keccak1600.c: internalize KeccakF1600 and simplify SHA3_absorb.
Reviewed-by:
N
Bernd Edlinger
<
bernd.edlinger@hotmail.de
>
上级
edbc681d
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
17 addition
and
35 deletion
+17
-35
crypto/sha/keccak1600.c
crypto/sha/keccak1600.c
+17
-35
未找到文件。
crypto/sha/keccak1600.c
浏览文件 @
b4f2a462
...
...
@@ -212,7 +212,7 @@ static void Iota(uint64_t A[5][5], size_t i)
A
[
0
][
0
]
^=
iotas
[
i
];
}
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
static
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
{
size_t
i
;
...
...
@@ -347,7 +347,7 @@ static void Round(uint64_t A[5][5], size_t i)
A
[
4
][
4
]
=
C
[
4
]
^
(
~
C
[
0
]
&
C
[
1
]);
}
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
static
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
{
size_t
i
;
...
...
@@ -490,7 +490,7 @@ static void Round(uint64_t A[5][5], size_t i)
A
[
0
][
0
]
^=
iotas
[
i
];
}
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
static
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
{
size_t
i
;
...
...
@@ -628,7 +628,7 @@ static void Round(uint64_t R[5][5], uint64_t A[5][5], size_t i)
#endif
}
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
static
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
{
uint64_t
T
[
5
][
5
];
size_t
i
;
...
...
@@ -946,7 +946,7 @@ static void FourRounds(uint64_t A[5][5], size_t i)
/* C[4] ^= */
A
[
4
][
4
]
=
B
[
4
]
^
(
~
B
[
0
]
&
B
[
1
]);
}
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
static
void
KeccakF1600
(
uint64_t
A
[
5
][
5
])
{
size_t
i
;
...
...
@@ -1071,14 +1071,22 @@ size_t SHA3_absorb(uint64_t A[5][5], const unsigned char *inp, size_t len,
void
SHA3_squeeze
(
uint64_t
A
[
5
][
5
],
unsigned
char
*
out
,
size_t
len
,
size_t
r
)
{
uint64_t
*
A_flat
=
(
uint64_t
*
)
A
;
size_t
i
,
rem
,
w
=
r
/
8
;
size_t
i
,
w
=
r
/
8
;
assert
(
r
<
(
25
*
sizeof
(
A
[
0
][
0
]))
&&
(
r
%
8
)
==
0
);
while
(
len
>=
r
)
{
for
(
i
=
0
;
i
<
w
;
i
++
)
{
while
(
len
!=
0
)
{
for
(
i
=
0
;
i
<
w
&&
len
!=
0
;
i
++
)
{
uint64_t
Ai
=
BitDeinterleave
(
A_flat
[
i
]);
if
(
len
<
8
)
{
for
(
i
=
0
;
i
<
len
;
i
++
)
{
*
out
++
=
(
unsigned
char
)
Ai
;
Ai
>>=
8
;
}
return
;
}
out
[
0
]
=
(
unsigned
char
)(
Ai
);
out
[
1
]
=
(
unsigned
char
)(
Ai
>>
8
);
out
[
2
]
=
(
unsigned
char
)(
Ai
>>
16
);
...
...
@@ -1088,37 +1096,11 @@ void SHA3_squeeze(uint64_t A[5][5], unsigned char *out, size_t len, size_t r)
out
[
6
]
=
(
unsigned
char
)(
Ai
>>
48
);
out
[
7
]
=
(
unsigned
char
)(
Ai
>>
56
);
out
+=
8
;
len
-=
8
;
}
len
-=
r
;
if
(
len
)
KeccakF1600
(
A
);
}
rem
=
len
%
8
;
len
/=
8
;
for
(
i
=
0
;
i
<
len
;
i
++
)
{
uint64_t
Ai
=
BitDeinterleave
(
A_flat
[
i
]);
out
[
0
]
=
(
unsigned
char
)(
Ai
);
out
[
1
]
=
(
unsigned
char
)(
Ai
>>
8
);
out
[
2
]
=
(
unsigned
char
)(
Ai
>>
16
);
out
[
3
]
=
(
unsigned
char
)(
Ai
>>
24
);
out
[
4
]
=
(
unsigned
char
)(
Ai
>>
32
);
out
[
5
]
=
(
unsigned
char
)(
Ai
>>
40
);
out
[
6
]
=
(
unsigned
char
)(
Ai
>>
48
);
out
[
7
]
=
(
unsigned
char
)(
Ai
>>
56
);
out
+=
8
;
}
if
(
rem
)
{
uint64_t
Ai
=
BitDeinterleave
(
A_flat
[
i
]);
for
(
i
=
0
;
i
<
rem
;
i
++
)
{
*
out
++
=
(
unsigned
char
)
Ai
;
Ai
>>=
8
;
}
}
}
#else
size_t
SHA3_absorb
(
uint64_t
A
[
5
][
5
],
const
unsigned
char
*
inp
,
size_t
len
,
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录