Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
c83a4db5
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
大约 1 年 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
You need to sign in or sign up before continuing.
提交
c83a4db5
编写于
5月 31, 2017
作者:
A
Andy Polyakov
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
sha/keccak1600.c: add ARM-specific "reference" tweaks.
Reviewed-by:
N
Rich Salz
<
rsalz@openssl.org
>
上级
8fc063dc
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
41 addition
and
21 deletion
+41
-21
crypto/sha/keccak1600.c
crypto/sha/keccak1600.c
+41
-21
未找到文件。
crypto/sha/keccak1600.c
浏览文件 @
c83a4db5
...
...
@@ -223,7 +223,8 @@ void KeccakF1600(uint64_t A[5][5])
*/
static
void
Round
(
uint64_t
A
[
5
][
5
],
size_t
i
)
{
uint64_t
C
[
5
],
D
[
5
],
T
[
2
][
5
];
uint64_t
C
[
5
],
E
[
2
];
/* registers */
uint64_t
D
[
5
],
T
[
2
][
5
];
/* memory */
assert
(
i
<
(
sizeof
(
iotas
)
/
sizeof
(
iotas
[
0
])));
...
...
@@ -233,41 +234,60 @@ static void Round(uint64_t A[5][5], size_t i)
C
[
3
]
=
A
[
0
][
3
]
^
A
[
1
][
3
]
^
A
[
2
][
3
]
^
A
[
3
][
3
]
^
A
[
4
][
3
];
C
[
4
]
=
A
[
0
][
4
]
^
A
[
1
][
4
]
^
A
[
2
][
4
]
^
A
[
3
][
4
]
^
A
[
4
][
4
];
#if defined(__arm__)
D
[
1
]
=
E
[
0
]
=
ROL64
(
C
[
2
],
1
)
^
C
[
0
];
D
[
4
]
=
E
[
1
]
=
ROL64
(
C
[
0
],
1
)
^
C
[
3
];
D
[
0
]
=
C
[
0
]
=
ROL64
(
C
[
1
],
1
)
^
C
[
4
];
D
[
2
]
=
C
[
1
]
=
ROL64
(
C
[
3
],
1
)
^
C
[
1
];
D
[
3
]
=
C
[
2
]
=
ROL64
(
C
[
4
],
1
)
^
C
[
2
];
T
[
0
][
0
]
=
A
[
3
][
0
]
^
C
[
0
];
/* borrow T[0][0] */
T
[
0
][
1
]
=
A
[
0
][
1
]
^
E
[
0
];
/* D[1] */
T
[
0
][
2
]
=
A
[
0
][
2
]
^
C
[
1
];
/* D[2] */
T
[
0
][
3
]
=
A
[
0
][
3
]
^
C
[
2
];
/* D[3] */
T
[
0
][
4
]
=
A
[
0
][
4
]
^
E
[
1
];
/* D[4] */
C
[
3
]
=
ROL64
(
A
[
3
][
3
]
^
C
[
2
],
rhotates
[
3
][
3
]);
/* D[3] */
C
[
4
]
=
ROL64
(
A
[
4
][
4
]
^
E
[
1
],
rhotates
[
4
][
4
]);
/* D[4] */
C
[
0
]
=
A
[
0
][
0
]
^
C
[
0
];
/* rotate by 0 */
/* D[0] */
C
[
2
]
=
ROL64
(
A
[
2
][
2
]
^
C
[
1
],
rhotates
[
2
][
2
]);
/* D[2] */
C
[
1
]
=
ROL64
(
A
[
1
][
1
]
^
E
[
0
],
rhotates
[
1
][
1
]);
/* D[1] */
#else
D
[
0
]
=
ROL64
(
C
[
1
],
1
)
^
C
[
4
];
D
[
1
]
=
ROL64
(
C
[
2
],
1
)
^
C
[
0
];
D
[
2
]
=
ROL64
(
C
[
3
],
1
)
^
C
[
1
];
D
[
3
]
=
ROL64
(
C
[
4
],
1
)
^
C
[
2
];
D
[
4
]
=
ROL64
(
C
[
0
],
1
)
^
C
[
3
];
C
[
0
]
=
A
[
0
][
0
]
^
D
[
0
];
/* rotate by 0 */
C
[
1
]
=
ROL64
(
A
[
1
][
1
]
^
D
[
1
],
rhotates
[
1
][
1
]);
C
[
2
]
=
ROL64
(
A
[
2
][
2
]
^
D
[
2
],
rhotates
[
2
][
2
]);
C
[
3
]
=
ROL64
(
A
[
3
][
3
]
^
D
[
3
],
rhotates
[
3
][
3
]);
C
[
4
]
=
ROL64
(
A
[
4
][
4
]
^
D
[
4
],
rhotates
[
4
][
4
]);
T
[
0
][
0
]
=
A
[
3
][
0
]
^
D
[
0
];
/* borrow T[0][0] */
T
[
0
][
1
]
=
A
[
0
][
1
]
^
D
[
1
];
T
[
0
][
2
]
=
A
[
0
][
2
]
^
D
[
2
];
T
[
0
][
3
]
=
A
[
0
][
3
]
^
D
[
3
];
T
[
0
][
4
]
=
A
[
0
][
4
]
^
D
[
4
];
C
[
0
]
=
A
[
0
][
0
]
^
D
[
0
];
/* rotate by 0 */
C
[
1
]
=
ROL64
(
A
[
1
][
1
]
^
D
[
1
],
rhotates
[
1
][
1
]);
C
[
2
]
=
ROL64
(
A
[
2
][
2
]
^
D
[
2
],
rhotates
[
2
][
2
]);
C
[
3
]
=
ROL64
(
A
[
3
][
3
]
^
D
[
3
],
rhotates
[
3
][
3
]);
C
[
4
]
=
ROL64
(
A
[
4
][
4
]
^
D
[
4
],
rhotates
[
4
][
4
]);
#endif
A
[
0
][
0
]
=
C
[
0
]
^
(
~
C
[
1
]
&
C
[
2
])
^
iotas
[
i
];
A
[
0
][
1
]
=
C
[
1
]
^
(
~
C
[
2
]
&
C
[
3
]);
A
[
0
][
2
]
=
C
[
2
]
^
(
~
C
[
3
]
&
C
[
4
]);
A
[
0
][
3
]
=
C
[
3
]
^
(
~
C
[
4
]
&
C
[
0
]);
A
[
0
][
4
]
=
C
[
4
]
^
(
~
C
[
0
]
&
C
[
1
]);
C
[
0
]
=
ROL64
(
T
[
0
][
3
],
rhotates
[
0
][
3
]);
C
[
1
]
=
ROL64
(
A
[
1
][
4
]
^
D
[
4
],
rhotates
[
1
][
4
]);
C
[
2
]
=
ROL64
(
A
[
2
][
0
]
^
D
[
0
],
rhotates
[
2
][
0
]);
C
[
3
]
=
ROL64
(
A
[
3
][
1
]
^
D
[
1
],
rhotates
[
3
][
1
]);
C
[
4
]
=
ROL64
(
A
[
4
][
2
]
^
D
[
2
],
rhotates
[
4
][
2
]);
T
[
1
][
0
]
=
A
[
1
][
0
]
^
(
C
[
3
]
=
D
[
0
]);
T
[
1
][
1
]
=
A
[
2
][
1
]
^
(
C
[
4
]
=
D
[
1
]);
/* borrow T[1][1] */
T
[
1
][
2
]
=
A
[
1
][
2
]
^
(
E
[
0
]
=
D
[
2
]);
T
[
1
][
3
]
=
A
[
1
][
3
]
^
(
E
[
1
]
=
D
[
3
]);
T
[
1
][
4
]
=
A
[
2
][
4
]
^
(
C
[
2
]
=
D
[
4
]);
/* borrow T[1][4] */
T
[
1
][
0
]
=
A
[
1
][
0
]
^
D
[
0
]
;
T
[
1
][
1
]
=
A
[
2
][
1
]
^
D
[
1
];
/* borrow T[1][1
] */
T
[
1
][
2
]
=
A
[
1
][
2
]
^
D
[
2
];
T
[
1
][
3
]
=
A
[
1
][
3
]
^
D
[
3
];
T
[
1
][
4
]
=
A
[
2
][
4
]
^
D
[
4
];
/* borrow T[1][4
] */
C
[
0
]
=
ROL64
(
T
[
0
][
3
],
rhotates
[
0
][
3
])
;
C
[
1
]
=
ROL64
(
A
[
1
][
4
]
^
C
[
2
],
rhotates
[
1
][
4
]);
/* D[4
] */
C
[
2
]
=
ROL64
(
A
[
2
][
0
]
^
C
[
3
],
rhotates
[
2
][
0
]);
/* D[0] */
C
[
3
]
=
ROL64
(
A
[
3
][
1
]
^
C
[
4
],
rhotates
[
3
][
1
]);
/* D[1] */
C
[
4
]
=
ROL64
(
A
[
4
][
2
]
^
E
[
0
],
rhotates
[
4
][
2
]);
/* D[2
] */
A
[
1
][
0
]
=
C
[
0
]
^
(
~
C
[
1
]
&
C
[
2
]);
A
[
1
][
1
]
=
C
[
1
]
^
(
~
C
[
2
]
&
C
[
3
]);
...
...
@@ -815,10 +835,10 @@ static uint64_t BitDeinterleave(uint64_t Ai)
/*
* SHA3_absorb can be called multiple times, but at each invocation
* largest multiple of |r| out of |len| bytes are processed. Then
* remaining amount of bytes
are
returned. This is done to spare caller
* trouble of calculating the largest multiple of |r|
, effectively the
*
blocksize. It is commonly (1600 - 256*n)/8, e.g. 168, 136, 104, 72
,
* but can also be (1600 - 448)/8 = 144. All this means that message
* remaining amount of bytes
is
returned. This is done to spare caller
* trouble of calculating the largest multiple of |r|
. |r| can be viewed
*
as blocksize. It is commonly (1600 - 256*n)/8, e.g. 168, 136, 104
,
*
72,
but can also be (1600 - 448)/8 = 144. All this means that message
* padding and intermediate sub-block buffering, byte- or bitwise, is
* caller's reponsibility.
*/
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录