+ fix hmac-sha256
+ camelia (128 bit Key only) C/ASM and C only
This commit is contained in:
parent
4d19a3429e
commit
38806fc750
|
@ -0,0 +1,339 @@
|
||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
Version 2, June 1991
|
||||||
|
|
||||||
|
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
|
||||||
|
675 Mass Ave, Cambridge, MA 02139, USA
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The licenses for most software are designed to take away your
|
||||||
|
freedom to share and change it. By contrast, the GNU General Public
|
||||||
|
License is intended to guarantee your freedom to share and change free
|
||||||
|
software--to make sure the software is free for all its users. This
|
||||||
|
General Public License applies to most of the Free Software
|
||||||
|
Foundation's software and to any other program whose authors commit to
|
||||||
|
using it. (Some other Free Software Foundation software is covered by
|
||||||
|
the GNU Library General Public License instead.) You can apply it to
|
||||||
|
your programs, too.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
|
have the freedom to distribute copies of free software (and charge for
|
||||||
|
this service if you wish), that you receive source code or can get it
|
||||||
|
if you want it, that you can change the software or use pieces of it
|
||||||
|
in new free programs; and that you know you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to make restrictions that forbid
|
||||||
|
anyone to deny you these rights or to ask you to surrender the rights.
|
||||||
|
These restrictions translate to certain responsibilities for you if you
|
||||||
|
distribute copies of the software, or if you modify it.
|
||||||
|
|
||||||
|
For example, if you distribute copies of such a program, whether
|
||||||
|
gratis or for a fee, you must give the recipients all the rights that
|
||||||
|
you have. You must make sure that they, too, receive or can get the
|
||||||
|
source code. And you must show them these terms so they know their
|
||||||
|
rights.
|
||||||
|
|
||||||
|
We protect your rights with two steps: (1) copyright the software, and
|
||||||
|
(2) offer you this license which gives you legal permission to copy,
|
||||||
|
distribute and/or modify the software.
|
||||||
|
|
||||||
|
Also, for each author's protection and ours, we want to make certain
|
||||||
|
that everyone understands that there is no warranty for this free
|
||||||
|
software. If the software is modified by someone else and passed on, we
|
||||||
|
want its recipients to know that what they have is not the original, so
|
||||||
|
that any problems introduced by others will not reflect on the original
|
||||||
|
authors' reputations.
|
||||||
|
|
||||||
|
Finally, any free program is threatened constantly by software
|
||||||
|
patents. We wish to avoid the danger that redistributors of a free
|
||||||
|
program will individually obtain patent licenses, in effect making the
|
||||||
|
program proprietary. To prevent this, we have made it clear that any
|
||||||
|
patent must be licensed for everyone's free use or not licensed at all.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and
|
||||||
|
modification follow.
|
||||||
|
|
||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||||
|
|
||||||
|
0. This License applies to any program or other work which contains
|
||||||
|
a notice placed by the copyright holder saying it may be distributed
|
||||||
|
under the terms of this General Public License. The "Program", below,
|
||||||
|
refers to any such program or work, and a "work based on the Program"
|
||||||
|
means either the Program or any derivative work under copyright law:
|
||||||
|
that is to say, a work containing the Program or a portion of it,
|
||||||
|
either verbatim or with modifications and/or translated into another
|
||||||
|
language. (Hereinafter, translation is included without limitation in
|
||||||
|
the term "modification".) Each licensee is addressed as "you".
|
||||||
|
|
||||||
|
Activities other than copying, distribution and modification are not
|
||||||
|
covered by this License; they are outside its scope. The act of
|
||||||
|
running the Program is not restricted, and the output from the Program
|
||||||
|
is covered only if its contents constitute a work based on the
|
||||||
|
Program (independent of having been made by running the Program).
|
||||||
|
Whether that is true depends on what the Program does.
|
||||||
|
|
||||||
|
1. You may copy and distribute verbatim copies of the Program's
|
||||||
|
source code as you receive it, in any medium, provided that you
|
||||||
|
conspicuously and appropriately publish on each copy an appropriate
|
||||||
|
copyright notice and disclaimer of warranty; keep intact all the
|
||||||
|
notices that refer to this License and to the absence of any warranty;
|
||||||
|
and give any other recipients of the Program a copy of this License
|
||||||
|
along with the Program.
|
||||||
|
|
||||||
|
You may charge a fee for the physical act of transferring a copy, and
|
||||||
|
you may at your option offer warranty protection in exchange for a fee.
|
||||||
|
|
||||||
|
2. You may modify your copy or copies of the Program or any portion
|
||||||
|
of it, thus forming a work based on the Program, and copy and
|
||||||
|
distribute such modifications or work under the terms of Section 1
|
||||||
|
above, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) You must cause the modified files to carry prominent notices
|
||||||
|
stating that you changed the files and the date of any change.
|
||||||
|
|
||||||
|
b) You must cause any work that you distribute or publish, that in
|
||||||
|
whole or in part contains or is derived from the Program or any
|
||||||
|
part thereof, to be licensed as a whole at no charge to all third
|
||||||
|
parties under the terms of this License.
|
||||||
|
|
||||||
|
c) If the modified program normally reads commands interactively
|
||||||
|
when run, you must cause it, when started running for such
|
||||||
|
interactive use in the most ordinary way, to print or display an
|
||||||
|
announcement including an appropriate copyright notice and a
|
||||||
|
notice that there is no warranty (or else, saying that you provide
|
||||||
|
a warranty) and that users may redistribute the program under
|
||||||
|
these conditions, and telling the user how to view a copy of this
|
||||||
|
License. (Exception: if the Program itself is interactive but
|
||||||
|
does not normally print such an announcement, your work based on
|
||||||
|
the Program is not required to print an announcement.)
|
||||||
|
|
||||||
|
These requirements apply to the modified work as a whole. If
|
||||||
|
identifiable sections of that work are not derived from the Program,
|
||||||
|
and can be reasonably considered independent and separate works in
|
||||||
|
themselves, then this License, and its terms, do not apply to those
|
||||||
|
sections when you distribute them as separate works. But when you
|
||||||
|
distribute the same sections as part of a whole which is a work based
|
||||||
|
on the Program, the distribution of the whole must be on the terms of
|
||||||
|
this License, whose permissions for other licensees extend to the
|
||||||
|
entire whole, and thus to each and every part regardless of who wrote it.
|
||||||
|
|
||||||
|
Thus, it is not the intent of this section to claim rights or contest
|
||||||
|
your rights to work written entirely by you; rather, the intent is to
|
||||||
|
exercise the right to control the distribution of derivative or
|
||||||
|
collective works based on the Program.
|
||||||
|
|
||||||
|
In addition, mere aggregation of another work not based on the Program
|
||||||
|
with the Program (or with a work based on the Program) on a volume of
|
||||||
|
a storage or distribution medium does not bring the other work under
|
||||||
|
the scope of this License.
|
||||||
|
|
||||||
|
3. You may copy and distribute the Program (or a work based on it,
|
||||||
|
under Section 2) in object code or executable form under the terms of
|
||||||
|
Sections 1 and 2 above provided that you also do one of the following:
|
||||||
|
|
||||||
|
a) Accompany it with the complete corresponding machine-readable
|
||||||
|
source code, which must be distributed under the terms of Sections
|
||||||
|
1 and 2 above on a medium customarily used for software interchange; or,
|
||||||
|
|
||||||
|
b) Accompany it with a written offer, valid for at least three
|
||||||
|
years, to give any third party, for a charge no more than your
|
||||||
|
cost of physically performing source distribution, a complete
|
||||||
|
machine-readable copy of the corresponding source code, to be
|
||||||
|
distributed under the terms of Sections 1 and 2 above on a medium
|
||||||
|
customarily used for software interchange; or,
|
||||||
|
|
||||||
|
c) Accompany it with the information you received as to the offer
|
||||||
|
to distribute corresponding source code. (This alternative is
|
||||||
|
allowed only for noncommercial distribution and only if you
|
||||||
|
received the program in object code or executable form with such
|
||||||
|
an offer, in accord with Subsection b above.)
|
||||||
|
|
||||||
|
The source code for a work means the preferred form of the work for
|
||||||
|
making modifications to it. For an executable work, complete source
|
||||||
|
code means all the source code for all modules it contains, plus any
|
||||||
|
associated interface definition files, plus the scripts used to
|
||||||
|
control compilation and installation of the executable. However, as a
|
||||||
|
special exception, the source code distributed need not include
|
||||||
|
anything that is normally distributed (in either source or binary
|
||||||
|
form) with the major components (compiler, kernel, and so on) of the
|
||||||
|
operating system on which the executable runs, unless that component
|
||||||
|
itself accompanies the executable.
|
||||||
|
|
||||||
|
If distribution of executable or object code is made by offering
|
||||||
|
access to copy from a designated place, then offering equivalent
|
||||||
|
access to copy the source code from the same place counts as
|
||||||
|
distribution of the source code, even though third parties are not
|
||||||
|
compelled to copy the source along with the object code.
|
||||||
|
|
||||||
|
4. You may not copy, modify, sublicense, or distribute the Program
|
||||||
|
except as expressly provided under this License. Any attempt
|
||||||
|
otherwise to copy, modify, sublicense or distribute the Program is
|
||||||
|
void, and will automatically terminate your rights under this License.
|
||||||
|
However, parties who have received copies, or rights, from you under
|
||||||
|
this License will not have their licenses terminated so long as such
|
||||||
|
parties remain in full compliance.
|
||||||
|
|
||||||
|
5. You are not required to accept this License, since you have not
|
||||||
|
signed it. However, nothing else grants you permission to modify or
|
||||||
|
distribute the Program or its derivative works. These actions are
|
||||||
|
prohibited by law if you do not accept this License. Therefore, by
|
||||||
|
modifying or distributing the Program (or any work based on the
|
||||||
|
Program), you indicate your acceptance of this License to do so, and
|
||||||
|
all its terms and conditions for copying, distributing or modifying
|
||||||
|
the Program or works based on it.
|
||||||
|
|
||||||
|
6. Each time you redistribute the Program (or any work based on the
|
||||||
|
Program), the recipient automatically receives a license from the
|
||||||
|
original licensor to copy, distribute or modify the Program subject to
|
||||||
|
these terms and conditions. You may not impose any further
|
||||||
|
restrictions on the recipients' exercise of the rights granted herein.
|
||||||
|
You are not responsible for enforcing compliance by third parties to
|
||||||
|
this License.
|
||||||
|
|
||||||
|
7. If, as a consequence of a court judgment or allegation of patent
|
||||||
|
infringement or for any other reason (not limited to patent issues),
|
||||||
|
conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot
|
||||||
|
distribute so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you
|
||||||
|
may not distribute the Program at all. For example, if a patent
|
||||||
|
license would not permit royalty-free redistribution of the Program by
|
||||||
|
all those who receive copies directly or indirectly through you, then
|
||||||
|
the only way you could satisfy both it and this License would be to
|
||||||
|
refrain entirely from distribution of the Program.
|
||||||
|
|
||||||
|
If any portion of this section is held invalid or unenforceable under
|
||||||
|
any particular circumstance, the balance of the section is intended to
|
||||||
|
apply and the section as a whole is intended to apply in other
|
||||||
|
circumstances.
|
||||||
|
|
||||||
|
It is not the purpose of this section to induce you to infringe any
|
||||||
|
patents or other property right claims or to contest validity of any
|
||||||
|
such claims; this section has the sole purpose of protecting the
|
||||||
|
integrity of the free software distribution system, which is
|
||||||
|
implemented by public license practices. Many people have made
|
||||||
|
generous contributions to the wide range of software distributed
|
||||||
|
through that system in reliance on consistent application of that
|
||||||
|
system; it is up to the author/donor to decide if he or she is willing
|
||||||
|
to distribute software through any other system and a licensee cannot
|
||||||
|
impose that choice.
|
||||||
|
|
||||||
|
This section is intended to make thoroughly clear what is believed to
|
||||||
|
be a consequence of the rest of this License.
|
||||||
|
|
||||||
|
8. If the distribution and/or use of the Program is restricted in
|
||||||
|
certain countries either by patents or by copyrighted interfaces, the
|
||||||
|
original copyright holder who places the Program under this License
|
||||||
|
may add an explicit geographical distribution limitation excluding
|
||||||
|
those countries, so that distribution is permitted only in or among
|
||||||
|
countries not thus excluded. In such case, this License incorporates
|
||||||
|
the limitation as if written in the body of this License.
|
||||||
|
|
||||||
|
9. The Free Software Foundation may publish revised and/or new versions
|
||||||
|
of the General Public License from time to time. Such new versions will
|
||||||
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
|
address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the Program
|
||||||
|
specifies a version number of this License which applies to it and "any
|
||||||
|
later version", you have the option of following the terms and conditions
|
||||||
|
either of that version or of any later version published by the Free
|
||||||
|
Software Foundation. If the Program does not specify a version number of
|
||||||
|
this License, you may choose any version ever published by the Free Software
|
||||||
|
Foundation.
|
||||||
|
|
||||||
|
10. If you wish to incorporate parts of the Program into other free
|
||||||
|
programs whose distribution conditions are different, write to the author
|
||||||
|
to ask for permission. For software which is copyrighted by the Free
|
||||||
|
Software Foundation, write to the Free Software Foundation; we sometimes
|
||||||
|
make exceptions for this. Our decision will be guided by the two goals
|
||||||
|
of preserving the free status of all derivatives of our free software and
|
||||||
|
of promoting the sharing and reuse of software generally.
|
||||||
|
|
||||||
|
NO WARRANTY
|
||||||
|
|
||||||
|
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||||||
|
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||||||
|
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||||||
|
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||||||
|
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||||
|
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||||||
|
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||||||
|
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||||||
|
REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||||||
|
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||||||
|
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||||||
|
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||||||
|
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||||||
|
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||||||
|
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||||||
|
POSSIBILITY OF SUCH DAMAGES.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
Appendix: How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest
|
||||||
|
possible use to the public, the best way to achieve this is to make it
|
||||||
|
free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest
|
||||||
|
to attach them to the start of each source file to most effectively
|
||||||
|
convey the exclusion of warranty; and each file should have at least
|
||||||
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
<one line to give the program's name and a brief idea of what it does.>
|
||||||
|
Copyright (C) 19yy <name of author>
|
||||||
|
|
||||||
|
This program is free software; you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation; either version 2 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program; if not, write to the Free Software
|
||||||
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If the program is interactive, make it output a short notice like this
|
||||||
|
when it starts in an interactive mode:
|
||||||
|
|
||||||
|
Gnomovision version 69, Copyright (C) 19yy name of author
|
||||||
|
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
|
This is free software, and you are welcome to redistribute it
|
||||||
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
|
parts of the General Public License. Of course, the commands you use may
|
||||||
|
be called something other than `show w' and `show c'; they could even be
|
||||||
|
mouse-clicks or menu items--whatever suits your program.
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or your
|
||||||
|
school, if any, to sign a "copyright disclaimer" for the program, if
|
||||||
|
necessary. Here is a sample; alter the names:
|
||||||
|
|
||||||
|
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||||||
|
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||||||
|
|
||||||
|
<signature of Ty Coon>, 1 April 1989
|
||||||
|
Ty Coon, President of Vice
|
||||||
|
|
||||||
|
This General Public License does not permit incorporating your program into
|
||||||
|
proprietary programs. If your program is a subroutine library, you may
|
||||||
|
consider it more useful to permit linking proprietary applications with the
|
||||||
|
library. If this is what you want to do, use the GNU Library General
|
||||||
|
Public License instead of this License.
|
7
Makefile
7
Makefile
|
@ -1,9 +1,12 @@
|
||||||
PRG = skipjack
|
PRG = rc6
|
||||||
|
# camellia
|
||||||
# cryptotest
|
# cryptotest
|
||||||
OBJ = main-skipjack-test.o debug.o uart.o serial-tools.o skipjack.o
|
# OBJ = main-camellia-test.o debug.o uart.o serial-tools.o camellia.o camellia-asm.o
|
||||||
|
# main-skipjack-test.o debug.o uart.o serial-tools.o skipjack.o
|
||||||
# main-sha1-test.o debug.o uart.o serial-tools.o sha1-asm.o
|
# main-sha1-test.o debug.o uart.o serial-tools.o sha1-asm.o
|
||||||
# main-md5-test.o debug.o uart.o serial-tools.o md5.o
|
# main-md5-test.o debug.o uart.o serial-tools.o md5.o
|
||||||
# main-cast5-test.o debug.o uart.o serial-tools.o cast5.o
|
# main-cast5-test.o debug.o uart.o serial-tools.o cast5.o
|
||||||
|
OBJ = main-rc6-test.o debug.o uart.o serial-tools.o rc6.o
|
||||||
# main.o debug.o uart.o serial-tools.o sha256-asm.o xtea-asm.o arcfour-asm.o prng.o cast5.o
|
# main.o debug.o uart.o serial-tools.o sha256-asm.o xtea-asm.o arcfour-asm.o prng.o cast5.o
|
||||||
MCU_TARGET = atmega32
|
MCU_TARGET = atmega32
|
||||||
OPTIMIZE = -Os
|
OPTIMIZE = -Os
|
||||||
|
|
|
@ -0,0 +1,977 @@
|
||||||
|
/*
|
||||||
|
* File: camellis-asm.S
|
||||||
|
* Author: Daniel Otte
|
||||||
|
* Date: 10.11.2006
|
||||||
|
* License: GPL
|
||||||
|
* Description: Implementation of the camellia block cipher algorithm.
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
.macro SWAP_R A, B
|
||||||
|
eor \A, \B
|
||||||
|
eor \B, \A
|
||||||
|
eor \A, \B
|
||||||
|
.endm
|
||||||
|
|
||||||
|
.macro precall
|
||||||
|
/* push r18 - r27, r30 - r31*/
|
||||||
|
push r0
|
||||||
|
push r1
|
||||||
|
push r18
|
||||||
|
push r19
|
||||||
|
push r20
|
||||||
|
push r21
|
||||||
|
push r22
|
||||||
|
push r23
|
||||||
|
push r24
|
||||||
|
push r25
|
||||||
|
push r26
|
||||||
|
push r27
|
||||||
|
push r30
|
||||||
|
push r31
|
||||||
|
clr r1
|
||||||
|
.endm
|
||||||
|
|
||||||
|
.macro postcall
|
||||||
|
pop r31
|
||||||
|
pop r30
|
||||||
|
pop r27
|
||||||
|
pop r26
|
||||||
|
pop r25
|
||||||
|
pop r24
|
||||||
|
pop r23
|
||||||
|
pop r22
|
||||||
|
pop r21
|
||||||
|
pop r20
|
||||||
|
pop r19
|
||||||
|
pop r18
|
||||||
|
pop r1
|
||||||
|
pop r0
|
||||||
|
.endm
|
||||||
|
|
||||||
|
|
||||||
|
.macro hexdump length
|
||||||
|
push r27
|
||||||
|
push r26
|
||||||
|
ldi r25, '\r'
|
||||||
|
mov r24, r25
|
||||||
|
call uart_putc
|
||||||
|
ldi r25, '\n'
|
||||||
|
mov r24, r25
|
||||||
|
call uart_putc
|
||||||
|
pop r26
|
||||||
|
pop r27
|
||||||
|
movw r24, r26
|
||||||
|
.if \length > 16
|
||||||
|
ldi r22, lo8(16)
|
||||||
|
ldi r23, hi8(16)
|
||||||
|
push r27
|
||||||
|
push r26
|
||||||
|
call uart_hexdump
|
||||||
|
pop r26
|
||||||
|
pop r27
|
||||||
|
adiw r26, 16
|
||||||
|
hexdump \length-16
|
||||||
|
.else
|
||||||
|
ldi r22, lo8(\length)
|
||||||
|
ldi r23, hi8(\length)
|
||||||
|
call uart_hexdump
|
||||||
|
.endif
|
||||||
|
.endm
|
||||||
|
|
||||||
|
/* X points to Block */
|
||||||
|
.macro dbg_hexdump length
|
||||||
|
precall
|
||||||
|
hexdump \length
|
||||||
|
postcall
|
||||||
|
.endm
|
||||||
|
|
||||||
|
SPL = 0x3D
|
||||||
|
SPH = 0x3E
|
||||||
|
SREG = 0x3F
|
||||||
|
NULLr = 1
|
||||||
|
|
||||||
|
|
||||||
|
camellia_sbox:
|
||||||
|
.byte 112, 130, 44, 236, 179, 39, 192, 229, 228, 133, 87, 53, 234, 12, 174, 65
|
||||||
|
.byte 35, 239, 107, 147, 69, 25, 165, 33, 237, 14, 79, 78, 29, 101, 146, 189
|
||||||
|
.byte 134, 184, 175, 143, 124, 235, 31, 206, 62, 48, 220, 95, 94, 197, 11, 26
|
||||||
|
.byte 166, 225, 57, 202, 213, 71, 93, 61, 217, 1, 90, 214, 81, 86, 108, 77
|
||||||
|
.byte 139, 13, 154, 102, 251, 204, 176, 45, 116, 18, 43, 32, 240, 177, 132, 153
|
||||||
|
.byte 223, 76, 203, 194, 52, 126, 118, 5, 109, 183, 169, 49, 209, 23, 4, 215
|
||||||
|
.byte 20, 88, 58, 97, 222, 27, 17, 28, 50, 15, 156, 22, 83, 24, 242, 34
|
||||||
|
.byte 254, 68, 207, 178, 195, 181, 122, 145, 36, 8, 232, 168, 96, 252, 105, 80
|
||||||
|
.byte 170, 208, 160, 125, 161, 137, 98, 151, 84, 91, 30, 149, 224, 255, 100, 210
|
||||||
|
.byte 16, 196, 0, 72, 163, 247, 117, 219, 138, 3, 230, 218, 9, 63, 221, 148
|
||||||
|
.byte 135, 92, 131, 2, 205, 74, 144, 51, 115, 103, 246, 243, 157, 127, 191, 226
|
||||||
|
.byte 82, 155, 216, 38, 200, 55, 198, 59, 129, 150, 111, 75, 19, 190, 99, 46
|
||||||
|
.byte 233, 121, 167, 140, 159, 110, 188, 142, 41, 245, 249, 182, 47, 253, 180, 89
|
||||||
|
.byte 120, 152, 6, 106, 231, 70, 113, 186, 212, 37, 171, 66, 136, 162, 141, 250
|
||||||
|
.byte 114, 7, 185, 85, 248, 238, 172, 10, 54, 73, 42, 104, 60, 56, 241, 164
|
||||||
|
.byte 64, 40, 211, 123, 187, 201, 67, 193, 21, 227, 173, 244, 119, 199, 128, 158
|
||||||
|
|
||||||
|
//.global camellia_sigma
|
||||||
|
/*
|
||||||
|
camellia_sigma:
|
||||||
|
.quad 0xA09E667F3BCC908B
|
||||||
|
.quad 0xB67AE8584CAA73B2
|
||||||
|
.quad 0xC6EF372FE94F82BE
|
||||||
|
.quad 0x54FF53A5F1D36F1C
|
||||||
|
.quad 0x10E527FADE682D1D
|
||||||
|
.quad 0xB05688C2B3E6C1FD
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/* uint8_t camellia_s1(uint8_t b) */
|
||||||
|
.global camellia_s1
|
||||||
|
camellia_s1:
|
||||||
|
ldi r30, lo8(camellia_sbox)
|
||||||
|
ldi r31, hi8(camellia_sbox)
|
||||||
|
add r30, r24
|
||||||
|
adc r31, NULLr
|
||||||
|
lpm r24, Z
|
||||||
|
clr r25
|
||||||
|
ret
|
||||||
|
|
||||||
|
.global camellia_s2
|
||||||
|
camellia_s2:
|
||||||
|
ldi r30, lo8(camellia_sbox)
|
||||||
|
ldi r31, hi8(camellia_sbox)
|
||||||
|
add r30, r24
|
||||||
|
adc r31, NULLr
|
||||||
|
lpm r24, Z
|
||||||
|
lsl r24
|
||||||
|
adc r24, NULLr
|
||||||
|
clr r25
|
||||||
|
ret
|
||||||
|
|
||||||
|
.global camellia_s3
|
||||||
|
camellia_s3:
|
||||||
|
ldi r30, lo8(camellia_sbox)
|
||||||
|
ldi r31, hi8(camellia_sbox)
|
||||||
|
add r30, r24
|
||||||
|
adc r31, NULLr
|
||||||
|
lpm r24, Z
|
||||||
|
bst r24, 0
|
||||||
|
lsr r24
|
||||||
|
bld r24, 7
|
||||||
|
clr r25
|
||||||
|
ret
|
||||||
|
|
||||||
|
.global camellia_s4
|
||||||
|
camellia_s4:
|
||||||
|
ldi r30, lo8(camellia_sbox)
|
||||||
|
ldi r31, hi8(camellia_sbox)
|
||||||
|
lsl r24
|
||||||
|
adc r24, NULLr
|
||||||
|
add r30, r24
|
||||||
|
adc r31, NULLr
|
||||||
|
lpm r24, Z
|
||||||
|
clr r25
|
||||||
|
ret
|
||||||
|
|
||||||
|
.global camellia_s
|
||||||
|
/* uint64_t camellia_s(uint64_t d){
|
||||||
|
#define D ((uint8_t*)(&d))
|
||||||
|
D[7] = camellia_s1(D[7]); // MSB
|
||||||
|
D[6] = camellia_s2(D[6]);
|
||||||
|
D[5] = camellia_s3(D[5]);
|
||||||
|
D[4] = camellia_s4(D[4]);
|
||||||
|
|
||||||
|
D[3] = camellia_s2(D[3]);
|
||||||
|
D[2] = camellia_s3(D[2]);
|
||||||
|
D[1] = camellia_s4(D[1]);
|
||||||
|
D[0] = camellia_s1(D[0]); // LSB
|
||||||
|
#undef D
|
||||||
|
return d;
|
||||||
|
}*/
|
||||||
|
; parameters
|
||||||
|
; d: r18-r25 (r18 is LSB)
|
||||||
|
camellia_s:
|
||||||
|
movw r26, r24 ; backup r24,r25 -> X
|
||||||
|
clr r25
|
||||||
|
call camellia_s2
|
||||||
|
mov r26, r24
|
||||||
|
|
||||||
|
mov r24, r27
|
||||||
|
call camellia_s1
|
||||||
|
mov r27, r24
|
||||||
|
|
||||||
|
mov r24, r23
|
||||||
|
call camellia_s3
|
||||||
|
mov r23, r24
|
||||||
|
|
||||||
|
mov r24, r22
|
||||||
|
call camellia_s4
|
||||||
|
mov r22, r24
|
||||||
|
|
||||||
|
mov r24, r21
|
||||||
|
call camellia_s2
|
||||||
|
mov r21, r24
|
||||||
|
|
||||||
|
mov r24, r20
|
||||||
|
call camellia_s3
|
||||||
|
mov r20, r24
|
||||||
|
|
||||||
|
mov r24, r19
|
||||||
|
call camellia_s4
|
||||||
|
mov r19, r24
|
||||||
|
|
||||||
|
|
||||||
|
mov r24, r18
|
||||||
|
call camellia_s1
|
||||||
|
mov r18, r24
|
||||||
|
|
||||||
|
movw r24, r26
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
/* uint64_t camellia_p(uint64_t d) */
|
||||||
|
; param: r18-r25 (r18 is LSB)
|
||||||
|
z1 = 25
|
||||||
|
z2 = 24
|
||||||
|
z3 = 23
|
||||||
|
z4 = 22
|
||||||
|
z5 = 21
|
||||||
|
z6 = 20
|
||||||
|
z7 = 19
|
||||||
|
z8 = 18
|
||||||
|
|
||||||
|
.global camellia_p
|
||||||
|
camellia_p:
|
||||||
|
eor z1, z6
|
||||||
|
eor z2, z7
|
||||||
|
eor z3, z8
|
||||||
|
eor z4, z5
|
||||||
|
eor z5, z3
|
||||||
|
eor z6, z4
|
||||||
|
eor z7, z1
|
||||||
|
eor z8, z2
|
||||||
|
;---------
|
||||||
|
eor z1, z8
|
||||||
|
eor z2, z5
|
||||||
|
eor z3, z6
|
||||||
|
eor z4, z7
|
||||||
|
eor z5, z4
|
||||||
|
eor z6, z1
|
||||||
|
eor z7, z2
|
||||||
|
eor z8, z3
|
||||||
|
;---------
|
||||||
|
movw r26, z8
|
||||||
|
movw r30, z6 ; backup z5 bis z8
|
||||||
|
movw z8, z4
|
||||||
|
movw z6, z2
|
||||||
|
movw z4, r26
|
||||||
|
movw z2, r30
|
||||||
|
ret
|
||||||
|
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
|
||||||
|
/* uint64_t camellia_f(uint64_t x, uint64_t k) */
|
||||||
|
; param x: r18-r25
|
||||||
|
; param k: r10-r17
|
||||||
|
.global camellia_f
|
||||||
|
camellia_f:
|
||||||
|
eor r18, r10
|
||||||
|
eor r19, r11
|
||||||
|
eor r20, r12
|
||||||
|
eor r21, r13
|
||||||
|
eor r22, r14
|
||||||
|
eor r23, r15
|
||||||
|
eor r24, r16
|
||||||
|
eor r25, r17
|
||||||
|
call camellia_s
|
||||||
|
call camellia_p
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
|
||||||
|
/* uint64_t camellia_fl(uint64_t x, uint64_t k) */
|
||||||
|
; param x: r18-r25 xl: r22-r25, xr: r18-r21
|
||||||
|
; param k: r10-r17 kl: r14-r17, kr: r10-r13
|
||||||
|
kl1 = 14
|
||||||
|
kl2 = 15
|
||||||
|
kl3 = 16
|
||||||
|
kl4 = 17
|
||||||
|
kr1 = 10
|
||||||
|
kr2 = 11
|
||||||
|
kr3 = 12
|
||||||
|
kr4 = 13
|
||||||
|
xr1 = 18
|
||||||
|
xr2 = 19
|
||||||
|
xr3 = 20
|
||||||
|
xr4 = 21
|
||||||
|
xl1 = 22
|
||||||
|
xl2 = 23
|
||||||
|
xl3 = 24
|
||||||
|
xl4 = 25
|
||||||
|
.global camellia_fl
|
||||||
|
camellia_fl:
|
||||||
|
and kl1, xl1
|
||||||
|
and kl2, xl2
|
||||||
|
and kl3, xl3
|
||||||
|
and kl4, xl4
|
||||||
|
mov r26, kl4
|
||||||
|
rol r26
|
||||||
|
rol kl1
|
||||||
|
rol kl2
|
||||||
|
rol kl3
|
||||||
|
rol kl4
|
||||||
|
eor xr1, kl1
|
||||||
|
eor xr2, kl2
|
||||||
|
eor xr3, kl3
|
||||||
|
eor xr4, kl4
|
||||||
|
// that was part one
|
||||||
|
or kr1, xr1
|
||||||
|
or kr2, xr2
|
||||||
|
or kr3, xr3
|
||||||
|
or kr4, xr4
|
||||||
|
eor xl1, kr1
|
||||||
|
eor xl2, kr2
|
||||||
|
eor xl3, kr3
|
||||||
|
eor xl4, kr4
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
|
||||||
|
/* uint64_t camellia_fl_inv(uint64_t y, uint64_t k) */
|
||||||
|
; param y: r18-r25 yl: r22-r25, yr: r18-r21
|
||||||
|
; param k: r10-r17 kl: r14-r17, kr: r10-r13
|
||||||
|
kl1 = 14
|
||||||
|
kl2 = 15
|
||||||
|
kl3 = 16
|
||||||
|
kl4 = 17
|
||||||
|
kr1 = 10
|
||||||
|
kr2 = 11
|
||||||
|
kr3 = 12
|
||||||
|
kr4 = 13
|
||||||
|
yr1 = 18
|
||||||
|
yr2 = 19
|
||||||
|
yr3 = 20
|
||||||
|
yr4 = 21
|
||||||
|
yl1 = 22
|
||||||
|
yl2 = 23
|
||||||
|
yl3 = 24
|
||||||
|
yl4 = 25
|
||||||
|
.global camellia_fl_inv
|
||||||
|
camellia_fl_inv:
|
||||||
|
or kr1, yr1
|
||||||
|
or kr2, yr2
|
||||||
|
or kr3, yr3
|
||||||
|
or kr4, yr4
|
||||||
|
eor yl1, kr1
|
||||||
|
eor yl2, kr2
|
||||||
|
eor yl3, kr3
|
||||||
|
eor yl4, kr4
|
||||||
|
// the first one is done
|
||||||
|
and kl1, yl1
|
||||||
|
and kl2, yl2
|
||||||
|
and kl3, yl3
|
||||||
|
and kl4, yl4
|
||||||
|
mov r26, kl4
|
||||||
|
rol r26
|
||||||
|
rol kl1
|
||||||
|
rol kl2
|
||||||
|
rol kl3
|
||||||
|
rol kl4
|
||||||
|
eor yr1, kl1
|
||||||
|
eor yr2, kl2
|
||||||
|
eor yr3, kl3
|
||||||
|
eor yr4, kl4
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
; param s: r24-r25
|
||||||
|
; param q: r22
|
||||||
|
B1 = 18
|
||||||
|
B2 = 19
|
||||||
|
.global camellia128_keyop_rot15
|
||||||
|
camellia128_keyop_rot15:
|
||||||
|
movw r30, r24 ; Z points at LSB of kl ;-- 0
|
||||||
|
ldi r22, 2
|
||||||
|
2: adiw r30, 15 ;-- 15
|
||||||
|
ld r21, Z
|
||||||
|
ld r20, -Z ;-- 14
|
||||||
|
movw B1, r20 ; store Backup of the 2 MSB of kl
|
||||||
|
ror r20
|
||||||
|
|
||||||
|
ldi r21, 14
|
||||||
|
1: ld r20, -Z ;-- 13..0
|
||||||
|
ror r20
|
||||||
|
std Z+2, r20 ;-- (15..2)
|
||||||
|
dec r21
|
||||||
|
brne 1b
|
||||||
|
|
||||||
|
ror B2
|
||||||
|
ror B1
|
||||||
|
st Z+, B1 ;-- 1
|
||||||
|
st Z, B2
|
||||||
|
adiw r30, 15 ;-- 16
|
||||||
|
|
||||||
|
dec r22
|
||||||
|
brne 2b
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
; param s: r24-r25
|
||||||
|
; param q: r22
|
||||||
|
.global camellia128_keyop_rot17
|
||||||
|
camellia128_keyop_rot17:
|
||||||
|
push r8
|
||||||
|
push r9
|
||||||
|
push r10
|
||||||
|
push r11
|
||||||
|
push r12
|
||||||
|
push r13
|
||||||
|
push r14
|
||||||
|
push r15
|
||||||
|
push r16
|
||||||
|
push r17
|
||||||
|
clt
|
||||||
|
movw r30, r24
|
||||||
|
clr r27
|
||||||
|
2: ldi r26, 8
|
||||||
|
mov r1, r26
|
||||||
|
lsl r1 ; r1=16
|
||||||
|
;push r1
|
||||||
|
; load 128bit value
|
||||||
|
ldd r0, Z+15
|
||||||
|
rol r0
|
||||||
|
1: ld r0, Z+
|
||||||
|
rol r0
|
||||||
|
st X+, r0
|
||||||
|
dec r1
|
||||||
|
brne 1b
|
||||||
|
|
||||||
|
st -Z, 21
|
||||||
|
st -Z, 20
|
||||||
|
st -Z, 19
|
||||||
|
st -Z, 18
|
||||||
|
st -Z, 17
|
||||||
|
st -Z, 16
|
||||||
|
st -Z, 15
|
||||||
|
st -Z, 14 ;--
|
||||||
|
st -Z, 13
|
||||||
|
st -Z, 12
|
||||||
|
st -Z, 11
|
||||||
|
st -Z, 10
|
||||||
|
st -Z, 9
|
||||||
|
st -Z, 8
|
||||||
|
st -Z, 23
|
||||||
|
st -Z, 22
|
||||||
|
|
||||||
|
brts 2f
|
||||||
|
set
|
||||||
|
adiw r30, 16
|
||||||
|
rjmp 2b
|
||||||
|
2:
|
||||||
|
pop r17
|
||||||
|
pop r16
|
||||||
|
pop r15
|
||||||
|
pop r14
|
||||||
|
pop r13
|
||||||
|
pop r12
|
||||||
|
pop r11
|
||||||
|
pop r10
|
||||||
|
pop r9
|
||||||
|
pop r8
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
; param s: r24-r25
|
||||||
|
; param q: r22
|
||||||
|
.global camellia128_keyop
|
||||||
|
camellia128_keyop:
|
||||||
|
cpi r22, 1
|
||||||
|
breq camellia128_keyop_rot17
|
||||||
|
rjmp camellia128_keyop_rot15
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
; param s: r24-r25
|
||||||
|
; param q: r22
|
||||||
|
B1 = 18
|
||||||
|
B2 = 19
|
||||||
|
.global camellia128_keyop_inv_rot15
|
||||||
|
camellia128_keyop_inv_rot15:
|
||||||
|
movw r30, r24 ; Z points at LSB of kl ;-- 0
|
||||||
|
movw r26, r24 ; X also
|
||||||
|
ldi r22, 2
|
||||||
|
2: ;-- 0
|
||||||
|
ld r20, Z+ ;-- 0/1
|
||||||
|
ld r21, Z+ ;-- 1/2
|
||||||
|
movw B1, r20 ; store Backup of the 2 LSB of kl
|
||||||
|
rol r21
|
||||||
|
|
||||||
|
ldi r20, 14
|
||||||
|
1: ld r21, Z+ ;-- 2/14..3/16
|
||||||
|
rol r21
|
||||||
|
st X+, r21 ;-- (0..13)/(1..14)
|
||||||
|
dec r20
|
||||||
|
brne 1b
|
||||||
|
|
||||||
|
rol B1
|
||||||
|
rol B2
|
||||||
|
st X+, B1 ;-- 14/15
|
||||||
|
st X+, B2 ;-- 15/16
|
||||||
|
|
||||||
|
dec r22
|
||||||
|
brne 2b
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
; param s: r24-r25
|
||||||
|
; param q: r22
|
||||||
|
.global camellia128_keyop_inv_rot17
|
||||||
|
camellia128_keyop_inv_rot17:
|
||||||
|
push r8
|
||||||
|
push r9
|
||||||
|
push r10
|
||||||
|
push r11
|
||||||
|
push r12
|
||||||
|
push r13
|
||||||
|
push r14
|
||||||
|
push r15
|
||||||
|
push r16
|
||||||
|
push r17
|
||||||
|
clt
|
||||||
|
movw r30, r24
|
||||||
|
clr r27
|
||||||
|
2: ldi r26, 8
|
||||||
|
mov r1, r26
|
||||||
|
lsl r1 ; r1=16
|
||||||
|
; load 128bit value
|
||||||
|
|
||||||
|
ld r0, Z
|
||||||
|
adiw r30, 16
|
||||||
|
ror r0
|
||||||
|
1: ld r0, -Z
|
||||||
|
ror r0
|
||||||
|
st X+, r0
|
||||||
|
dec r1
|
||||||
|
brne 1b
|
||||||
|
|
||||||
|
st Z+, 21
|
||||||
|
st Z+, 20
|
||||||
|
st Z+, 19
|
||||||
|
st Z+, 18
|
||||||
|
st Z+, 17
|
||||||
|
st Z+, 16
|
||||||
|
st Z+, 15
|
||||||
|
st Z+, 14 ;--
|
||||||
|
st Z+, 13
|
||||||
|
st Z+, 12
|
||||||
|
st Z+, 11
|
||||||
|
st Z+, 10
|
||||||
|
st Z+, 9
|
||||||
|
st Z+, 8
|
||||||
|
st Z+, 23
|
||||||
|
st Z+, 22
|
||||||
|
|
||||||
|
brts 2f
|
||||||
|
set
|
||||||
|
; adiw r30, 16
|
||||||
|
rjmp 2b
|
||||||
|
2:
|
||||||
|
pop r17
|
||||||
|
pop r16
|
||||||
|
pop r15
|
||||||
|
pop r14
|
||||||
|
pop r13
|
||||||
|
pop r12
|
||||||
|
pop r11
|
||||||
|
pop r10
|
||||||
|
pop r9
|
||||||
|
pop r8
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
; param s: r24-r25
|
||||||
|
; param q: r22
|
||||||
|
.global camellia128_keyop_inv
|
||||||
|
camellia128_keyop_inv:
|
||||||
|
cpi r22, 1
|
||||||
|
breq camellia128_keyop_inv_rot17
|
||||||
|
rjmp camellia128_keyop_inv_rot15
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
; param p: r24-r25 pointer to data
|
||||||
|
; param l: r22 length of word
|
||||||
|
.global change_endian
|
||||||
|
change_endian:
|
||||||
|
movw r26, r24
|
||||||
|
movw r30, r24
|
||||||
|
add r30, r22
|
||||||
|
adc r31, r1
|
||||||
|
lsr r22
|
||||||
|
1:
|
||||||
|
ld r20, X
|
||||||
|
ld r21, -Z
|
||||||
|
st X+, r21
|
||||||
|
st Z, r20
|
||||||
|
dec r22
|
||||||
|
brne 1b
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
|
||||||
|
#define SEL_KA 1
|
||||||
|
#define SEL_KL 0
|
||||||
|
#define KEY_POSTC1 0x00
|
||||||
|
#define KEY_POSTC2 0x01
|
||||||
|
#define KEY_INC2 0x02
|
||||||
|
#define KEY_DIR 0x04
|
||||||
|
#define KEY_DIR_NORM 0x00
|
||||||
|
#define KEY_DIR_INV 0x04
|
||||||
|
#define KEY_AMMOUNT 0x08
|
||||||
|
#define KEY_ROL17 0x08
|
||||||
|
#define KEY_ROL15 0x00
|
||||||
|
/*
|
||||||
|
void camellia_6rounds(camellia128_ctx_t* s, uint64_t* bl, uint64_t* br, uint8_t roundop, uint8_t keychoice){
|
||||||
|
uint8_t i;
|
||||||
|
uint64_t* k[4];
|
||||||
|
k[0] = &(s->kll);
|
||||||
|
k[1] = &(s->klr);
|
||||||
|
k[2] = &(s->kal);
|
||||||
|
k[3] = &(s->kar);
|
||||||
|
for(i=0; i<3; ++i){ / * each cycle * /
|
||||||
|
br[0] ^= camellia_f(bl[0],*(k[(keychoice&1)*2+((roundop&KEY_DIR)?1:0)]));
|
||||||
|
keychoice >>= 1;
|
||||||
|
|
||||||
|
if((i == 1) && (roundop&KEY_INC2)){
|
||||||
|
((roundop&KEY_DIR)?camellia128_keyop_inv:camellia128_keyop)(s,(roundop&KEY_AMMOUNT)?1:-1);
|
||||||
|
}
|
||||||
|
|
||||||
|
bl[0] ^= camellia_f(br[0],*(k[(keychoice&1)*2+((roundop&KEY_DIR)?0:1)]));
|
||||||
|
keychoice >>= 1;
|
||||||
|
|
||||||
|
/ * check if we should do some keyop * /
|
||||||
|
if((i == (roundop&1)) && (!(roundop&KEY_INC2)) ){
|
||||||
|
((roundop&KEY_DIR)?camellia128_keyop_inv:camellia128_keyop)(s,(roundop&KEY_AMMOUNT)?1:-1);
|
||||||
|
/ * isn't it fuckin nice what we can do in C?! * /
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
*/
|
||||||
|
; param s: r24-r25
|
||||||
|
; param bl: r22-r23
|
||||||
|
; param br: r20-r21
|
||||||
|
; param roundop: r18
|
||||||
|
; param keychoice: r16
|
||||||
|
s1 = 24
|
||||||
|
s2 = 25
|
||||||
|
bl1 = 22
|
||||||
|
bl2 = 23
|
||||||
|
br1 = 20
|
||||||
|
br2 = 22
|
||||||
|
xro = 18
|
||||||
|
kc = 16
|
||||||
|
xro_sec = 17
|
||||||
|
br1_sec = 10
|
||||||
|
br2_sec = 11
|
||||||
|
bl1_sec = 12
|
||||||
|
bl2_sec = 13
|
||||||
|
s1_sec = 14
|
||||||
|
t = 9
|
||||||
|
loop_cnt = 8
|
||||||
|
keyop_time = 7
|
||||||
|
|
||||||
|
.global camellia_6rounds
|
||||||
|
camellia_6rounds:
|
||||||
|
push r17
|
||||||
|
push r16
|
||||||
|
push r15
|
||||||
|
push r14
|
||||||
|
push r13
|
||||||
|
push r12
|
||||||
|
push r11
|
||||||
|
push r10
|
||||||
|
push r9
|
||||||
|
push r8
|
||||||
|
push r7
|
||||||
|
|
||||||
|
ldi r17, 6
|
||||||
|
mov loop_cnt, r17
|
||||||
|
mov xro_sec, xro
|
||||||
|
movw br1_sec, br1
|
||||||
|
movw bl1_sec, bl1
|
||||||
|
movw s1_sec, s1
|
||||||
|
clr keyop_time
|
||||||
|
inc keyop_time
|
||||||
|
sec
|
||||||
|
rol keyop_time // keyop_time == 3
|
||||||
|
SBRC xro, 1 // KEY_INC2
|
||||||
|
rjmp 1f
|
||||||
|
SBRS xro, 0 // KEY_POSTC1
|
||||||
|
inc keyop_time
|
||||||
|
SBRS xro, 0 // KEY_POSTC1
|
||||||
|
inc keyop_time
|
||||||
|
rjmp 2f
|
||||||
|
1: inc keyop_time
|
||||||
|
2:
|
||||||
|
main_loop:
|
||||||
|
/* now we load the key to r18-r25 */
|
||||||
|
movw r26, s1_sec
|
||||||
|
SBRC kc, 0 /* select between KA and KL */
|
||||||
|
adiw r26, 16
|
||||||
|
SBRC xro_sec, 2 // KEY_DIR
|
||||||
|
rjmp 2f
|
||||||
|
SBRS loop_cnt, 0 /* enc */
|
||||||
|
adiw r26, 8
|
||||||
|
rjmp 3f
|
||||||
|
2: SBRC loop_cnt, 0 /* dec */
|
||||||
|
adiw r26, 8
|
||||||
|
rjmp 3f
|
||||||
|
3:
|
||||||
|
lsr kc
|
||||||
|
ld r18, X+
|
||||||
|
ld r19, X+
|
||||||
|
ld r20, X+
|
||||||
|
ld r21, X+
|
||||||
|
ld r22, X+
|
||||||
|
ld r23, X+
|
||||||
|
ld r24, X+
|
||||||
|
ld r25, X+
|
||||||
|
/* now we xor bl in */
|
||||||
|
movw r26, bl1_sec
|
||||||
|
ld r0, X+
|
||||||
|
eor r18, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r19, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r20, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r21, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r22, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r23, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r24, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r25, r0
|
||||||
|
/* f(x,k) = p(s(x xor k)) ; xor is done */
|
||||||
|
call camellia_s;
|
||||||
|
call camellia_p;
|
||||||
|
|
||||||
|
// in r26, SPL
|
||||||
|
// in r27, SPH
|
||||||
|
// sbiw r26, 9
|
||||||
|
// dbg_hexdump 10
|
||||||
|
/* now we have to xor the result into br */
|
||||||
|
clr r31
|
||||||
|
ldi r30, 18
|
||||||
|
movw r26, br1_sec
|
||||||
|
; ldi r1, 8 ;-- this won't work
|
||||||
|
clr r1
|
||||||
|
sec
|
||||||
|
ror r1
|
||||||
|
swap r1
|
||||||
|
1: ld r0, X
|
||||||
|
ld t, Z+
|
||||||
|
eor r0, t
|
||||||
|
st X+, r0
|
||||||
|
dec r1
|
||||||
|
brne 1b
|
||||||
|
|
||||||
|
/* check for keyop */
|
||||||
|
cp loop_cnt, keyop_time
|
||||||
|
brne 3f
|
||||||
|
movw s1, s1_sec
|
||||||
|
ldi r22, 1
|
||||||
|
SBRS xro_sec, 3 // KEY_ROL17
|
||||||
|
neg r22
|
||||||
|
SBRS xro_sec, 2 // KEY_DIR
|
||||||
|
rjmp 2f
|
||||||
|
call camellia128_keyop_inv
|
||||||
|
rjmp 3f
|
||||||
|
2: call camellia128_keyop
|
||||||
|
3: /* loop back */
|
||||||
|
SWAP_R br1_sec, bl1_sec
|
||||||
|
SWAP_R br2_sec, bl2_sec
|
||||||
|
dec loop_cnt
|
||||||
|
breq 2f
|
||||||
|
jmp main_loop
|
||||||
|
2:
|
||||||
|
pop r7
|
||||||
|
pop r8
|
||||||
|
pop r9
|
||||||
|
pop r10
|
||||||
|
pop r11
|
||||||
|
pop r12
|
||||||
|
pop r13
|
||||||
|
pop r14
|
||||||
|
pop r15
|
||||||
|
pop r16
|
||||||
|
pop r17
|
||||||
|
ret
|
||||||
|
|
||||||
|
;##############################################################################
|
||||||
|
/*
|
||||||
|
void camellia128_init(camellia128_ctx_t* s, uint8_t* key){
|
||||||
|
uint8_t i;
|
||||||
|
s->kll = 0; //((uint64_t*)key)[0];
|
||||||
|
|
||||||
|
/ * load the key, endian-adjusted, to kll,klr * /
|
||||||
|
for(i=0; i<8; ++i){
|
||||||
|
s->kll <<= 8;
|
||||||
|
s->kll |= *key++;
|
||||||
|
}
|
||||||
|
for(i=0; i<8; ++i){
|
||||||
|
s->klr <<= 8;
|
||||||
|
s->klr |= *key++;
|
||||||
|
}
|
||||||
|
|
||||||
|
s->kal = s->kll;
|
||||||
|
s->kar = s->klr;
|
||||||
|
|
||||||
|
s->kar ^= camellia_f(s->kal, camellia_sigma[0]);
|
||||||
|
s->kal ^= camellia_f(s->kar, camellia_sigma[1]);
|
||||||
|
|
||||||
|
s->kal ^= s->kll;
|
||||||
|
s->kar ^= s->klr;
|
||||||
|
|
||||||
|
s->kar ^= camellia_f(s->kal, camellia_sigma[2]);
|
||||||
|
s->kal ^= camellia_f(s->kar, camellia_sigma[3]);
|
||||||
|
/ * * /
|
||||||
|
// uart_putstr("\n\r----------------init finished--------------------");
|
||||||
|
}
|
||||||
|
*/
|
||||||
|
/*
|
||||||
|
X64_xor_in:
|
||||||
|
ld r0, X+
|
||||||
|
eor r18, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r19, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r20, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r21, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r22, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r23, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r24, r0
|
||||||
|
ld r0, X+
|
||||||
|
eor r25, r0
|
||||||
|
ret
|
||||||
|
|
||||||
|
X64_load:
|
||||||
|
ld r18, X+
|
||||||
|
ld r19, X+
|
||||||
|
ld r20, X+
|
||||||
|
ld r21, X+
|
||||||
|
ld r22, X+
|
||||||
|
ld r23, X+
|
||||||
|
ld r24, X+
|
||||||
|
ld r25, X+
|
||||||
|
ret
|
||||||
|
|
||||||
|
Y64_load_xor_store:
|
||||||
|
ld r0, Y
|
||||||
|
eor r18, r0
|
||||||
|
st Y+, r18
|
||||||
|
ld r0, Y
|
||||||
|
eor r19, r0
|
||||||
|
st Y+, r19
|
||||||
|
ld r0, Y
|
||||||
|
eor r20, r0
|
||||||
|
st Y+, r20
|
||||||
|
ld r0, Y
|
||||||
|
eor r21, r0
|
||||||
|
st Y+, r21
|
||||||
|
ld r0, Y
|
||||||
|
eor r22, r0
|
||||||
|
st Y+, r22
|
||||||
|
ld r0, Y
|
||||||
|
eor r23, r0
|
||||||
|
st Y+, r23
|
||||||
|
ld r0, Y
|
||||||
|
eor r24, r0
|
||||||
|
st Y+, r24
|
||||||
|
ld r0, Y
|
||||||
|
eor r25, r0
|
||||||
|
st Y+, r25
|
||||||
|
ret
|
||||||
|
|
||||||
|
; param s: r24-r25
|
||||||
|
; param *k: r22-r23
|
||||||
|
//.global camellia128_init
|
||||||
|
camellia128_init:
|
||||||
|
push r29
|
||||||
|
push r28
|
||||||
|
movw r30, r24 ; Z is statepointer
|
||||||
|
movw r26, r22 ; X is keypointer
|
||||||
|
clr r29
|
||||||
|
ldi r28, 18
|
||||||
|
// / * load key into kl, ka and kal to r18:r25 * /
|
||||||
|
adiw r26, 128/8 ;-- 16
|
||||||
|
ldi r16, (128/8)-1
|
||||||
|
1: ld r17, -X
|
||||||
|
std Z+(128/8), r17
|
||||||
|
st Z+, r17
|
||||||
|
sbrs r16, 3
|
||||||
|
st Y+, r17 ; this should only be done the last 8 rounds 0<=r16<=7
|
||||||
|
dec r16
|
||||||
|
brpl 1b
|
||||||
|
// / * step 1 * /
|
||||||
|
ldi r26, lo8(camellia_sigma)
|
||||||
|
ldi r27, hi8(camellia_sigma)
|
||||||
|
call X64_xor_in
|
||||||
|
call camellia_s
|
||||||
|
call camellia_p // / * f(x,k) is done * /
|
||||||
|
sbiw r30, 128/8
|
||||||
|
movw r28, r30 ; Z&Y point on kar now
|
||||||
|
call Y64_load_xor_store
|
||||||
|
|
||||||
|
// / * step 2 now * /
|
||||||
|
call X64_xor_in
|
||||||
|
call camellia_s
|
||||||
|
call camellia_p // / * f(x,k) is done * /
|
||||||
|
call Y64_load_xor_store
|
||||||
|
|
||||||
|
// / * now the xor part (kl and kr) * /
|
||||||
|
sbiw r30, 128/8 ; Z points to klr
|
||||||
|
ldi r16, 128/8
|
||||||
|
1: ld r0, Z+
|
||||||
|
ldd r1, Z+(128/8)-1
|
||||||
|
eor r0, r1
|
||||||
|
std Z+(128/8)-1, r0
|
||||||
|
dec r16
|
||||||
|
brne 1b
|
||||||
|
|
||||||
|
// / * now s->kar ^= camellia_f(s->kal, camellia_sigma[2]); * /
|
||||||
|
call X64_load ; load sigma[2]
|
||||||
|
movw r26, r28 ; X&Y point at kal
|
||||||
|
call X64_xor_in
|
||||||
|
call camellia_s
|
||||||
|
call camellia_p
|
||||||
|
sbiw r28, 128/8/2 ; Y points at kar
|
||||||
|
call Y64_load_xor_store
|
||||||
|
|
||||||
|
// / * now s->kal ^= camellia_f(s->kar, camellia_sigma[3]); * /
|
||||||
|
sbiw r26, 128/8 ;
|
||||||
|
call X64_load ; load kar
|
||||||
|
ldi r26, lo8(camellia_sigma+3*8)
|
||||||
|
ldi r27, hi8(camellia_sigma+3*8)
|
||||||
|
call X64_xor_in ; xor sigma[3] in
|
||||||
|
call camellia_s
|
||||||
|
call camellia_p
|
||||||
|
call Y64_load_xor_store
|
||||||
|
|
||||||
|
pop r28
|
||||||
|
pop r29
|
||||||
|
ret
|
||||||
|
|
||||||
|
//*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,210 @@
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
*
|
||||||
|
*
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
#include <avr/io.h>
|
||||||
|
#include <avr/pgmspace.h>
|
||||||
|
#include "camellia.h"
|
||||||
|
#include "uart.h"
|
||||||
|
#include "debug.h"
|
||||||
|
#include <util/delay.h>
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
uint64_t camellia_f(uint64_t x, uint64_t k);
|
||||||
|
/*****************************************************************************/
|
||||||
|
uint64_t camellia_fl(uint64_t x, uint64_t k);
|
||||||
|
/*****************************************************************************/
|
||||||
|
uint64_t camellia_fl_inv(uint64_t y, uint64_t k);
|
||||||
|
/*****************************************************************************/
|
||||||
|
void change_endian(void* data, uint8_t length);
|
||||||
|
|
||||||
|
uint64_t camellia_sigma[6]={
|
||||||
|
0xA09E667F3BCC908BLL,
|
||||||
|
0xB67AE8584CAA73B2LL,
|
||||||
|
0xC6EF372FE94F82BELL,
|
||||||
|
0x54FF53A5F1D36F1CLL,
|
||||||
|
0x10E527FADE682D1DLL,
|
||||||
|
0xB05688C2B3E6C1FDLL
|
||||||
|
};
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
void camellia128_ctx_dump(camellia128_ctx_t *s){
|
||||||
|
uart_putstr("\r\n==State Dump==");
|
||||||
|
uart_putstr("\n\rKAl: "); uart_hexdump(&(s->kal), 8);
|
||||||
|
uart_putstr("\n\rKAr: "); uart_hexdump(&(s->kar), 8);
|
||||||
|
uart_putstr("\n\rKLl: "); uart_hexdump(&(s->kll), 8);
|
||||||
|
uart_putstr("\n\rKLr: "); uart_hexdump(&(s->klr), 8);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
//*
|
||||||
|
//extern prog_uint64_t camellia_sigma[6];
|
||||||
|
|
||||||
|
void camellia128_init(camellia128_ctx_t* s, uint8_t* key){
|
||||||
|
uint8_t i;
|
||||||
|
s->kll = 0; //((uint64_t*)key)[0];
|
||||||
|
|
||||||
|
// / * load the key, endian-adjusted, to kll,klr * /
|
||||||
|
for(i=0; i<8; ++i){
|
||||||
|
s->kll <<= 8;
|
||||||
|
s->kll |= *key++;
|
||||||
|
}
|
||||||
|
for(i=0; i<8; ++i){
|
||||||
|
s->klr <<= 8;
|
||||||
|
s->klr |= *key++;
|
||||||
|
}
|
||||||
|
|
||||||
|
s->kal = s->kll;
|
||||||
|
s->kar = s->klr;
|
||||||
|
|
||||||
|
s->kar ^= camellia_f(s->kal, camellia_sigma[0]);
|
||||||
|
s->kal ^= camellia_f(s->kar, camellia_sigma[1]);
|
||||||
|
|
||||||
|
s->kal ^= s->kll;
|
||||||
|
s->kar ^= s->klr;
|
||||||
|
|
||||||
|
s->kar ^= camellia_f(s->kal, camellia_sigma[2]);
|
||||||
|
s->kal ^= camellia_f(s->kar, camellia_sigma[3]);
|
||||||
|
// / ** /
|
||||||
|
// uart_putstr("\n\r----------------init finished--------------------");
|
||||||
|
}
|
||||||
|
//*/
|
||||||
|
/*****************************************************************************/
|
||||||
|
void camellia128_keyop(camellia128_ctx_t* s, int8_t q);
|
||||||
|
/*****************************************************************************/
|
||||||
|
void camellia128_keyop_inv(camellia128_ctx_t* s, int8_t q);
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
#define SEL_KA 1
|
||||||
|
#define SEL_KL 0
|
||||||
|
|
||||||
|
#define KEY_POSTC1 0x00
|
||||||
|
#define KEY_POSTC2 0x01
|
||||||
|
#define KEY_INC2 0x02
|
||||||
|
|
||||||
|
#define KEY_DIR 0x04
|
||||||
|
#define KEY_DIR_NORM 0x00
|
||||||
|
#define KEY_DIR_INV 0x04
|
||||||
|
|
||||||
|
#define KEY_AMMOUNT 0x08
|
||||||
|
#define KEY_ROL17 0x08
|
||||||
|
#define KEY_ROL15 0x00
|
||||||
|
|
||||||
|
void camellia_6rounds(camellia128_ctx_t* s, uint64_t* bl, uint64_t* br, uint8_t roundop, uint8_t keychoice);
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
|
||||||
|
void camellia128_enc(camellia128_ctx_t* s, void* block){
|
||||||
|
|
||||||
|
#define BL (((uint64_t*)block)[0])
|
||||||
|
#define BR (((uint64_t*)block)[1])
|
||||||
|
/* endian adjustment */
|
||||||
|
/*BL*/
|
||||||
|
/* 1 2 3 4 5 6 7 8
|
||||||
|
* 8 7 6 5 4 3 2 1
|
||||||
|
*/
|
||||||
|
|
||||||
|
uint64_t temp64;
|
||||||
|
|
||||||
|
change_endian(&BL, 64/8);
|
||||||
|
change_endian(&BR, 64/8);
|
||||||
|
|
||||||
|
/* Prewhitening */
|
||||||
|
BL ^= s->kll;
|
||||||
|
BR ^= s->klr;
|
||||||
|
|
||||||
|
/* the first 6 */
|
||||||
|
camellia_6rounds(s, &BL, &BR, KEY_ROL15 | KEY_DIR_NORM | KEY_POSTC1 , 0x33);
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop(s, -1);
|
||||||
|
BL = camellia_fl(BL, s->kal);
|
||||||
|
BR = camellia_fl_inv(BR, s->kar);
|
||||||
|
camellia128_keyop(s, -1);
|
||||||
|
/* middle 6 */
|
||||||
|
camellia_6rounds(s, &BL, &BR, KEY_ROL15 | KEY_DIR_NORM | KEY_INC2 , 0x34);
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop(s, 1);
|
||||||
|
BL = camellia_fl(BL, s->kll);
|
||||||
|
BR = camellia_fl_inv(BR, s->klr);
|
||||||
|
camellia128_keyop(s, 1);
|
||||||
|
/* last 6 */
|
||||||
|
camellia_6rounds(s, &BL, &BR, KEY_ROL17 | KEY_DIR_NORM | KEY_POSTC2 , 0x0C);
|
||||||
|
/* Postwhitening */
|
||||||
|
BR ^= s->kal;
|
||||||
|
BL ^= s->kar;
|
||||||
|
|
||||||
|
temp64 = BR;
|
||||||
|
BR = BL;
|
||||||
|
BL = temp64;
|
||||||
|
|
||||||
|
|
||||||
|
change_endian(&BL, 64/8);
|
||||||
|
change_endian(&BR, 64/8);
|
||||||
|
|
||||||
|
#undef BL
|
||||||
|
#undef BR
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
void camellia128_dec(camellia128_ctx_t* s, void* block){
|
||||||
|
|
||||||
|
#define BL (((uint64_t*)block)[1])
|
||||||
|
#define BR (((uint64_t*)block)[0])
|
||||||
|
/* endian adjustment */
|
||||||
|
/*BL*/
|
||||||
|
/* 1 2 3 4 5 6 7 8
|
||||||
|
* 8 7 6 5 4 3 2 1
|
||||||
|
*/
|
||||||
|
|
||||||
|
uint64_t temp64;
|
||||||
|
|
||||||
|
change_endian(&BL, 64/8);
|
||||||
|
change_endian(&BR, 64/8);
|
||||||
|
|
||||||
|
camellia128_keyop_inv(s, 1);
|
||||||
|
/* Prewhitening */
|
||||||
|
BR ^= s->kal; /* kw3 */
|
||||||
|
BL ^= s->kar; /* kw4 */
|
||||||
|
/* the first 6 */
|
||||||
|
camellia_6rounds(s, &BR, &BL, KEY_ROL17 | KEY_DIR_INV | KEY_POSTC1 , 0x0C);
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop_inv(s, 1);
|
||||||
|
BR = camellia_fl(BR, s->klr);
|
||||||
|
BL = camellia_fl_inv(BL, s->kll);
|
||||||
|
camellia128_keyop_inv(s, 1);
|
||||||
|
/* middle 6 */
|
||||||
|
camellia_6rounds(s, &BR, &BL, KEY_ROL15 | KEY_DIR_INV | KEY_INC2 , 0x0B);
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop_inv(s, -1);
|
||||||
|
BR = camellia_fl(BR, s->kar);
|
||||||
|
BL = camellia_fl_inv(BL, s->kal);
|
||||||
|
camellia128_keyop_inv(s, -1);
|
||||||
|
/* last 6 */
|
||||||
|
camellia_6rounds(s, &BR, &BL, KEY_ROL15 | KEY_DIR_INV | KEY_POSTC2 , 0x33);
|
||||||
|
|
||||||
|
/* Postwhitening */
|
||||||
|
BL ^= s->kll; /* kw1 */
|
||||||
|
BR ^= s->klr; /* kw2 */
|
||||||
|
|
||||||
|
temp64 = BR;
|
||||||
|
BR = BL;
|
||||||
|
BL = temp64;
|
||||||
|
|
||||||
|
change_endian(&BL, 64/8);
|
||||||
|
change_endian(&BR, 64/8);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/* EOF */
|
|
@ -0,0 +1,19 @@
|
||||||
|
#ifndef CAMELLIA_H_
|
||||||
|
#define CAMELLIA_H_
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
typedef struct camellia128_ctx_s{
|
||||||
|
uint64_t klr;
|
||||||
|
uint64_t kll;
|
||||||
|
uint64_t kar;
|
||||||
|
uint64_t kal;
|
||||||
|
}camellia128_ctx_t;
|
||||||
|
|
||||||
|
|
||||||
|
void camellia128_init(camellia128_ctx_t* s, uint8_t* key);
|
||||||
|
void camellia128_enc(camellia128_ctx_t* s, void* block);
|
||||||
|
void camellia128_dec(camellia128_ctx_t* s, void* block);
|
||||||
|
|
||||||
|
|
||||||
|
#endif /*CAMELLIA_H_*/
|
|
@ -0,0 +1,529 @@
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
*
|
||||||
|
*
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
#include <avr/io.h>
|
||||||
|
#include <avr/pgmspace.h>
|
||||||
|
#include "camellia.h"
|
||||||
|
#include "uart.h"
|
||||||
|
#include "debug.h"
|
||||||
|
#include <util/delay.h>
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint8_t rol(uint8_t a, uint8_t n){return ((a<<n) | (a>>(8-n)));}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint8_t ror(uint8_t a, uint8_t n){return ((a<<(8-n)) | (a>>n));}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint32_t rol32(uint32_t a, uint8_t n){
|
||||||
|
return ((a<<n)|(a>>(32-n)));
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint64_t rol64(uint64_t a, uint8_t n){
|
||||||
|
return ((a<<n)|(a>>(64-n)));
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint8_t camellia_s1_table[256] PROGMEM = {
|
||||||
|
112, 130, 44, 236, 179, 39, 192, 229, 228, 133, 87, 53, 234, 12, 174, 65,
|
||||||
|
35, 239, 107, 147, 69, 25, 165, 33, 237, 14, 79, 78, 29, 101, 146, 189,
|
||||||
|
134, 184, 175, 143, 124, 235, 31, 206, 62, 48, 220, 95, 94, 197, 11, 26,
|
||||||
|
166, 225, 57, 202, 213, 71, 93, 61, 217, 1, 90, 214, 81, 86, 108, 77,
|
||||||
|
139, 13, 154, 102, 251, 204, 176, 45, 116, 18, 43, 32, 240, 177, 132, 153,
|
||||||
|
223, 76, 203, 194, 52, 126, 118, 5, 109, 183, 169, 49, 209, 23, 4, 215,
|
||||||
|
20, 88, 58, 97, 222, 27, 17, 28, 50, 15, 156, 22, 83, 24, 242, 34,
|
||||||
|
254, 68, 207, 178, 195, 181, 122, 145, 36, 8, 232, 168, 96, 252, 105, 80,
|
||||||
|
170, 208, 160, 125, 161, 137, 98, 151, 84, 91, 30, 149, 224, 255, 100, 210,
|
||||||
|
16, 196, 0, 72, 163, 247, 117, 219, 138, 3, 230, 218, 9, 63, 221, 148,
|
||||||
|
135, 92, 131, 2, 205, 74, 144, 51, 115, 103, 246, 243, 157, 127, 191, 226,
|
||||||
|
82, 155, 216, 38, 200, 55, 198, 59, 129, 150, 111, 75, 19, 190, 99, 46,
|
||||||
|
233, 121, 167, 140, 159, 110, 188, 142, 41, 245, 249, 182, 47, 253, 180, 89,
|
||||||
|
120, 152, 6, 106, 231, 70, 113, 186, 212, 37, 171, 66, 136, 162, 141, 250,
|
||||||
|
114, 7, 185, 85, 248, 238, 172, 10, 54, 73, 42, 104, 60, 56, 241, 164,
|
||||||
|
64, 40, 211, 123, 187, 201, 67, 193, 21, 227, 173, 244, 119, 199, 128, 158
|
||||||
|
};
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint8_t camellia_s1(uint8_t b){
|
||||||
|
return pgm_read_byte_near(&(camellia_s1_table[b]));
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint8_t camellia_s2(uint8_t b){
|
||||||
|
return rol(pgm_read_byte_near(&(camellia_s1_table[b])),1);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint8_t camellia_s3(uint8_t b){
|
||||||
|
return ror(pgm_read_byte_near(&(camellia_s1_table[b])),1);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint8_t camellia_s4(uint8_t b){
|
||||||
|
return pgm_read_byte_near(&(camellia_s1_table[rol(b,1)]));
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint64_t camellia_s(uint64_t d){
|
||||||
|
// uart_putstr("\n\r S von "); uart_hexdump(&(d), 8);
|
||||||
|
#define D ((uint8_t*)(&d))
|
||||||
|
D[7] = camellia_s1(D[7]);
|
||||||
|
D[6] = camellia_s2(D[6]);
|
||||||
|
D[5] = camellia_s3(D[5]);
|
||||||
|
D[4] = camellia_s4(D[4]);
|
||||||
|
|
||||||
|
D[3] = camellia_s2(D[3]);
|
||||||
|
D[2] = camellia_s3(D[2]);
|
||||||
|
D[1] = camellia_s4(D[1]);
|
||||||
|
D[0] = camellia_s1(D[0]);
|
||||||
|
#undef D
|
||||||
|
// uart_putstr(" ist "); uart_hexdump(&(d), 8);
|
||||||
|
return d;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint64_t camellia_p(uint64_t d){
|
||||||
|
uint64_t z=0;
|
||||||
|
#define D ((uint8_t*)(&d))
|
||||||
|
#define Z ((uint8_t*)(&z))
|
||||||
|
/*
|
||||||
|
Z[0] = D[4] ^ D[3] ^ D[1];
|
||||||
|
Z[1] = D[5] ^ D[0] ^ D[2];
|
||||||
|
Z[2] = D[6] ^ D[1] ^ D[3];
|
||||||
|
Z[3] = D[7] ^ D[2] ^ D[0];
|
||||||
|
Z[4] = D[0] ^ D[6] ^ D[5];
|
||||||
|
Z[5] = D[1] ^ D[7] ^ D[6];
|
||||||
|
Z[6] = D[2] ^ D[4] ^ D[7];
|
||||||
|
Z[7] = D[3] ^ D[5] ^ D[4];
|
||||||
|
*/
|
||||||
|
// Z[7] = z1 z3 z4 z6 z7 z8
|
||||||
|
// uart_putstr("\n\r P von "); uart_hexdump(&(d), 8);
|
||||||
|
|
||||||
|
Z[7] = D[7] ^ D[5] ^ D[4] ^ D[2] ^ D[1] ^ D[0];
|
||||||
|
Z[6] = D[7] ^ D[6] ^ D[4] ^ D[3] ^ D[1] ^ D[0];
|
||||||
|
Z[5] = D[7] ^ D[6] ^ D[5] ^ D[3] ^ D[2] ^ D[0];
|
||||||
|
Z[4] = D[6] ^ D[5] ^ D[4] ^ D[3] ^ D[2] ^ D[1] ;
|
||||||
|
Z[3] = D[7] ^ D[6] ^ D[2] ^ D[1] ^ D[0];
|
||||||
|
Z[2] = D[6] ^ D[5] ^ D[3] ^ D[1] ^ D[0];
|
||||||
|
Z[1] = D[5] ^ D[4] ^ D[3] ^ D[2] ^ D[0];
|
||||||
|
Z[0] = D[7] ^ D[4] ^ D[3] ^ D[2] ^ D[1] ;
|
||||||
|
|
||||||
|
// uart_putstr(" ist "); uart_hexdump(&(z), 8);
|
||||||
|
|
||||||
|
#undef Z
|
||||||
|
#undef D
|
||||||
|
return z;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint64_t camellia_f(uint64_t x, uint64_t k){
|
||||||
|
uint64_t y;
|
||||||
|
y = camellia_p(camellia_s(x ^ k));
|
||||||
|
/*
|
||||||
|
uart_putstr("\r\nEfunc X=");
|
||||||
|
uart_hexdump(&(x), 8);
|
||||||
|
uart_putstr(" K=");
|
||||||
|
uart_hexdump(&(k), 8);
|
||||||
|
uart_putstr(" Y=");
|
||||||
|
uart_hexdump(&(y), 8);
|
||||||
|
*/
|
||||||
|
return y;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint64_t camellia_fl(uint64_t x, uint64_t k){
|
||||||
|
volatile uint64_t lx[1], lk[1], y[1];
|
||||||
|
lx[0]=x; lk[0] = k;
|
||||||
|
|
||||||
|
#define Y ((uint32_t*)y)
|
||||||
|
#define X ((uint32_t*)lx)
|
||||||
|
#define K ((uint32_t*)lk)
|
||||||
|
|
||||||
|
Y[0] = rol32((X[1]) & K[1],1) ^ (X[0]); /* Yr */
|
||||||
|
Y[1] = (Y[0] | K[0]) ^ (X[1]); /* Yl */
|
||||||
|
|
||||||
|
/*
|
||||||
|
uart_putstr("\r\nFL(");
|
||||||
|
uart_hexdump(&(x), 8);
|
||||||
|
uart_putstr(", ");
|
||||||
|
uart_hexdump(&(k), 8);
|
||||||
|
uart_putstr(") = ");
|
||||||
|
uart_hexdump(y, 8);
|
||||||
|
*/
|
||||||
|
#undef K
|
||||||
|
#undef X
|
||||||
|
#undef Y
|
||||||
|
return y[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint64_t camellia_fl_inv(uint64_t y, uint64_t k){
|
||||||
|
//volatile uint32_t xl, xr;
|
||||||
|
volatile uint64_t ly[1], lk[1], x[1];
|
||||||
|
ly[0]=y; lk[0] = k;
|
||||||
|
#define Y ((uint32_t*)ly)
|
||||||
|
#define X ((uint32_t*)x)
|
||||||
|
#define K ((uint32_t*)lk)
|
||||||
|
|
||||||
|
X[1]=(Y[0] | K[0]) ^ Y[1];
|
||||||
|
X[0]=rol32((X[1] & K[1]),1) ^ Y[0];
|
||||||
|
|
||||||
|
/*
|
||||||
|
uart_putstr("\r\nFL_inv(");
|
||||||
|
uart_hexdump(&(y), 8);
|
||||||
|
uart_putstr(", ");
|
||||||
|
uart_hexdump(&(k), 8);
|
||||||
|
uart_putstr(") = ");
|
||||||
|
*/
|
||||||
|
#undef K
|
||||||
|
#undef X
|
||||||
|
#undef Y
|
||||||
|
return x[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
uint64_t camellia_sigma[6]={
|
||||||
|
0xA09E667F3BCC908BLL,
|
||||||
|
0xB67AE8584CAA73B2LL,
|
||||||
|
0xC6EF372FE94F82BELL,
|
||||||
|
0x54FF53A5F1D36F1CLL,
|
||||||
|
0x10E527FADE682D1DLL,
|
||||||
|
0xB05688C2B3E6C1FDLL
|
||||||
|
};
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
void camellia128_ctx_dump(camellia128_ctx_t *s){
|
||||||
|
uart_putstr("\r\n==State Dump==");
|
||||||
|
uart_putstr("\n\rKAl: "); uart_hexdump(&(s->kal), 8);
|
||||||
|
uart_putstr("\n\rKAr: "); uart_hexdump(&(s->kar), 8);
|
||||||
|
uart_putstr("\n\rKLl: "); uart_hexdump(&(s->kll), 8);
|
||||||
|
uart_putstr("\n\rKLr: "); uart_hexdump(&(s->klr), 8);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
void camellia128_init(camellia128_ctx_t* s, uint8_t* key){
|
||||||
|
uint8_t i;
|
||||||
|
s->kll = 0; //((uint64_t*)key)[0];
|
||||||
|
|
||||||
|
/* load the key, endian-adjusted, to kll,klr */
|
||||||
|
for(i=0; i<8; ++i){
|
||||||
|
s->kll <<= 8;
|
||||||
|
s->kll |= *key++;
|
||||||
|
}
|
||||||
|
for(i=0; i<8; ++i){
|
||||||
|
s->klr <<= 8;
|
||||||
|
s->klr |= *key++;
|
||||||
|
}
|
||||||
|
|
||||||
|
s->kal = s->kll;
|
||||||
|
s->kar = s->klr;
|
||||||
|
|
||||||
|
s->kar ^= camellia_f(s->kal, camellia_sigma[0]);
|
||||||
|
s->kal ^= camellia_f(s->kar, camellia_sigma[1]);
|
||||||
|
|
||||||
|
s->kal ^= s->kll;
|
||||||
|
s->kar ^= s->klr;
|
||||||
|
|
||||||
|
s->kar ^= camellia_f(s->kal, camellia_sigma[2]);
|
||||||
|
s->kal ^= camellia_f(s->kar, camellia_sigma[3]);
|
||||||
|
/**/
|
||||||
|
// uart_putstr("\n\r----------------init finished--------------------");
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
void camellia128_keyop(camellia128_ctx_t* s, int8_t q){
|
||||||
|
/* first we do 16 bit left-rols for kl and ka (128bit each) */
|
||||||
|
uint32_t temp;
|
||||||
|
|
||||||
|
temp = (s->kal)>>(64-16-q);
|
||||||
|
s->kal = s->kal<<(16+q) | s->kar>>(64-16-q);
|
||||||
|
s->kar = s->kar<<(16+q) | temp;
|
||||||
|
|
||||||
|
temp = (s->kll)>>(64-16-q);
|
||||||
|
s->kll = s->kll<<(16+q) | s->klr>>(64-16-q);
|
||||||
|
s->klr = s->klr<<(16+q) | temp;
|
||||||
|
/* after doing the 16-bit rol we have to rol 1 bit left or rigth depending on q */
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
void camellia128_keyop_inv(camellia128_ctx_t* s, int8_t q){
|
||||||
|
/* first we do 16 bit right-rols for kl and ka (128bit each) */
|
||||||
|
uint32_t temp;
|
||||||
|
|
||||||
|
temp = (s->kar)&(0xffffff>>(24-16-q));
|
||||||
|
s->kar = s->kar>>(16+q) | s->kal<<(64-16-q);
|
||||||
|
s->kal = s->kal>>(16+q) | ((uint64_t)temp)<<(64-16-q);
|
||||||
|
|
||||||
|
temp = (s->klr)&(0xffffff>>(24-16-q));
|
||||||
|
s->klr = s->klr>>(16+q) | s->kll<<(64-16-q);
|
||||||
|
s->kll = s->kll>>(16+q) | ((uint64_t)temp)<<(64-16-q);
|
||||||
|
/* after doing the 16-bit rol we have to rol 1 bit left or rigth depending on q */
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
#define SEL_KA 1
|
||||||
|
#define SEL_KL 0
|
||||||
|
|
||||||
|
#define KEY_POSTC1 0x00
|
||||||
|
#define KEY_POSTC2 0x01
|
||||||
|
#define KEY_INC2 0x02
|
||||||
|
|
||||||
|
#define KEY_DIR 0x04
|
||||||
|
#define KEY_DIR_NORM 0x00
|
||||||
|
#define KEY_DIR_INV 0x04
|
||||||
|
|
||||||
|
#define KEY_AMMOUNT 0x08
|
||||||
|
#define KEY_ROL17 0x08
|
||||||
|
#define KEY_ROL15 0x00
|
||||||
|
|
||||||
|
void camellia_6rounds(camellia128_ctx_t* s, uint64_t* bl, uint64_t* br, uint8_t roundop, uint8_t keychoice){
|
||||||
|
uint8_t i;
|
||||||
|
uint64_t* k[4];
|
||||||
|
k[0] = &(s->kll);
|
||||||
|
k[1] = &(s->klr);
|
||||||
|
k[2] = &(s->kal);
|
||||||
|
k[3] = &(s->kar);
|
||||||
|
for(i=0; i<3; ++i){ /* each cycle */
|
||||||
|
br[0] ^= camellia_f(bl[0],*(k[(keychoice&1)*2+((roundop&KEY_DIR)?1:0)]));
|
||||||
|
keychoice >>= 1;
|
||||||
|
|
||||||
|
if((i == 1) && (roundop&KEY_INC2)){
|
||||||
|
((roundop&KEY_DIR)?camellia128_keyop_inv:camellia128_keyop)(s,(roundop&KEY_AMMOUNT)?1:-1);
|
||||||
|
}
|
||||||
|
|
||||||
|
bl[0] ^= camellia_f(br[0],*(k[(keychoice&1)*2+((roundop&KEY_DIR)?0:1)]));
|
||||||
|
keychoice >>= 1;
|
||||||
|
|
||||||
|
/* check if we should do some keyop */
|
||||||
|
if((i == (roundop&1)) && (!(roundop&KEY_INC2)) ){
|
||||||
|
((roundop&KEY_DIR)?camellia128_keyop_inv:camellia128_keyop)(s,(roundop&KEY_AMMOUNT)?1:-1);
|
||||||
|
/* isn't it fuckin nice what we can do in C?! */
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
|
||||||
|
void camellia128_enc(camellia128_ctx_t* s, void* block){
|
||||||
|
|
||||||
|
#define BL (((uint64_t*)block)[0])
|
||||||
|
#define BR (((uint64_t*)block)[1])
|
||||||
|
/* endian adjustment */
|
||||||
|
/*BL*/
|
||||||
|
/* 1 2 3 4 5 6 7 8
|
||||||
|
* 8 7 6 5 4 3 2 1
|
||||||
|
*/
|
||||||
|
|
||||||
|
uint64_t temp64;
|
||||||
|
|
||||||
|
temp64 = BL;
|
||||||
|
BL = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
temp64 = BR;
|
||||||
|
BR = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
|
||||||
|
/* Prewhitening */
|
||||||
|
BL ^= s->kll;
|
||||||
|
BR ^= s->klr;
|
||||||
|
|
||||||
|
/* the first 6 */
|
||||||
|
/*
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->kar);
|
||||||
|
camellia128_keyop(s, -1);
|
||||||
|
BR ^= camellia_f(BL, s->kll);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->kar);
|
||||||
|
*/
|
||||||
|
camellia_6rounds(s, &BL, &BR, KEY_ROL15 | KEY_DIR_NORM | KEY_POSTC1 , 0x33);
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop(s, -1);
|
||||||
|
BL = camellia_fl(BL, s->kal);
|
||||||
|
BR = camellia_fl_inv(BR, s->kar);
|
||||||
|
camellia128_keyop(s, -1);
|
||||||
|
/* middle 6 */
|
||||||
|
/* BR ^= camellia_f(BL, s->kll);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
camellia128_keyop(s, -1);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->kar);
|
||||||
|
/*/
|
||||||
|
camellia_6rounds(s, &BL, &BR, KEY_ROL15 | KEY_DIR_NORM | KEY_INC2 , 0x34);
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop(s, 1);
|
||||||
|
BL = camellia_fl(BL, s->kll);
|
||||||
|
BR = camellia_fl_inv(BR, s->klr);
|
||||||
|
camellia128_keyop(s, 1);
|
||||||
|
/* last 6 */
|
||||||
|
/* BR ^= camellia_f(BL, s->kll);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->kar);
|
||||||
|
camellia128_keyop(s, 1);
|
||||||
|
|
||||||
|
BR ^= camellia_f(BL, s->kll);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
*/
|
||||||
|
camellia_6rounds(s, &BL, &BR, KEY_ROL17 | KEY_DIR_NORM | KEY_POSTC2 , 0x0C);
|
||||||
|
/* Postwhitening */
|
||||||
|
BR ^= s->kal;
|
||||||
|
BL ^= s->kar;
|
||||||
|
|
||||||
|
temp64 = BR;
|
||||||
|
BR = BL;
|
||||||
|
BL = temp64;
|
||||||
|
|
||||||
|
|
||||||
|
BL = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
temp64 = BR;
|
||||||
|
BR = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
|
||||||
|
#undef BL
|
||||||
|
#undef BR
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
void camellia128_dec(camellia128_ctx_t* s, void* block){
|
||||||
|
|
||||||
|
#define BL (((uint64_t*)block)[1])
|
||||||
|
#define BR (((uint64_t*)block)[0])
|
||||||
|
/* endian adjustment */
|
||||||
|
/*BL*/
|
||||||
|
/* 1 2 3 4 5 6 7 8
|
||||||
|
* 8 7 6 5 4 3 2 1
|
||||||
|
*/
|
||||||
|
|
||||||
|
uint64_t temp64;
|
||||||
|
|
||||||
|
temp64 = BL;
|
||||||
|
|
||||||
|
BL = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
temp64 = BR;
|
||||||
|
BR = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
|
||||||
|
camellia128_keyop_inv(s, 1);
|
||||||
|
/* Prewhitening */
|
||||||
|
BR ^= s->kal; /* kw3 */
|
||||||
|
BL ^= s->kar; /* kw4 */
|
||||||
|
|
||||||
|
/* the first 6 */
|
||||||
|
/*
|
||||||
|
BL ^= camellia_f(BR, s->klr); /* k18 * /
|
||||||
|
BR ^= camellia_f(BL, s->kll); /* k17 * /
|
||||||
|
camellia128_keyop_inv(s, 1);
|
||||||
|
BL ^= camellia_f(BR, s->kar);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
BR ^= camellia_f(BL, s->kll);
|
||||||
|
*/
|
||||||
|
camellia_6rounds(s, &BR, &BL, KEY_ROL17 | KEY_DIR_INV | KEY_POSTC1 , 0x0C);
|
||||||
|
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop_inv(s, 1);
|
||||||
|
BR = camellia_fl(BR, s->klr);
|
||||||
|
BL = camellia_fl_inv(BL, s->kll);
|
||||||
|
camellia128_keyop_inv(s, 1);
|
||||||
|
/* middle 6 */
|
||||||
|
/* BL ^= camellia_f(BR, s->kar);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
camellia128_keyop_inv(s, -1);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
BR ^= camellia_f(BL, s->kll);
|
||||||
|
*/
|
||||||
|
camellia_6rounds(s, &BR, &BL, KEY_ROL15 | KEY_DIR_INV | KEY_INC2 , 0x0B);
|
||||||
|
|
||||||
|
/* FL injection */
|
||||||
|
camellia128_keyop_inv(s, -1);
|
||||||
|
BR = camellia_fl(BR, s->kar);
|
||||||
|
BL = camellia_fl_inv(BL, s->kal);
|
||||||
|
camellia128_keyop_inv(s, -1);
|
||||||
|
/* last 6 */
|
||||||
|
/*
|
||||||
|
BL ^= camellia_f(BR, s->kar);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
BL ^= camellia_f(BR, s->klr);
|
||||||
|
BR ^= camellia_f(BL, s->kll);
|
||||||
|
camellia128_keyop_inv(s, -1);
|
||||||
|
BL ^= camellia_f(BR, s->kar);
|
||||||
|
BR ^= camellia_f(BL, s->kal);
|
||||||
|
/*/
|
||||||
|
camellia_6rounds(s, &BR, &BL, KEY_ROL15 | KEY_DIR_INV | KEY_POSTC2 , 0x33);
|
||||||
|
|
||||||
|
/* Postwhitening */
|
||||||
|
BL ^= s->kll; /* kw1 */
|
||||||
|
BR ^= s->klr; /* kw2 */
|
||||||
|
|
||||||
|
temp64 = BR;
|
||||||
|
BR = BL;
|
||||||
|
BL = temp64;
|
||||||
|
|
||||||
|
|
||||||
|
BL = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
temp64 = BR;
|
||||||
|
BR = temp64 >> 56 | temp64 << 56 /* swap the most out bytes (1 & 8) */
|
||||||
|
| (temp64 & (0xffLL<<48))>>(5*8) | (temp64 & (0xffLL<< 8))<<(5*8) /* 2 & 7 */
|
||||||
|
| (temp64 & (0xffLL<<40))>>(3*8) | (temp64 & (0xffLL<<16))<<(3*8) /* 3 & 6 */
|
||||||
|
| (temp64 & (0xffLL<<32))>>(1*8) | (temp64 & (0xffLL<<24))<<(1*8); /* 4 & 5 */
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/*****************************************************************************/
|
||||||
|
/*****************************************************************************/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/* EOF */
|
|
@ -79,6 +79,8 @@ void hmac_sha256(void* dest, void* key, uint16_t kl, void* msg, uint64_t ml){ /*
|
||||||
uint8_t i;
|
uint8_t i;
|
||||||
uint8_t buffer[SHA256_BLOCK_BITS/8];
|
uint8_t buffer[SHA256_BLOCK_BITS/8];
|
||||||
|
|
||||||
|
memset(buffer, 0, SHA256_BLOCK_BITS/8);
|
||||||
|
|
||||||
/* if key is larger than a block we have to hash it*/
|
/* if key is larger than a block we have to hash it*/
|
||||||
if (kl > SHA256_BLOCK_BITS){
|
if (kl > SHA256_BLOCK_BITS){
|
||||||
sha256((void*)buffer, key, kl);
|
sha256((void*)buffer, key, kl);
|
||||||
|
@ -101,9 +103,9 @@ void hmac_sha256(void* dest, void* key, uint16_t kl, void* msg, uint64_t ml){ /*
|
||||||
for (i=0; i<SHA256_BLOCK_BITS/8; ++i){
|
for (i=0; i<SHA256_BLOCK_BITS/8; ++i){
|
||||||
buffer[i] ^= IPAD ^ OPAD;
|
buffer[i] ^= IPAD ^ OPAD;
|
||||||
}
|
}
|
||||||
sha265_ctx2hash(dest, &s); /* save inner hash temporary to dest */
|
sha256_ctx2hash(dest, &s); /* save inner hash temporary to dest */
|
||||||
sha256_init(&s);
|
sha256_init(&s);
|
||||||
sha256_nextBlock(&s, buffer);
|
sha256_nextBlock(&s, buffer);
|
||||||
sha256_lastBlock(&s, dest, SHA256_HASH_BITS);
|
sha256_lastBlock(&s, dest, SHA256_HASH_BITS);
|
||||||
sha265_ctx2hash(dest, &s);
|
sha256_ctx2hash(dest, &s);
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,17 @@
|
||||||
|
#ifndef HMACSHA256_H_
|
||||||
|
#define HMACSHA256_H_
|
||||||
|
|
||||||
|
#include "sha256.h"
|
||||||
|
|
||||||
|
#define HMAC_BITS SHA256_HASH_BITS
|
||||||
|
#define HMAC_BYTES (HMAC_BITS/8)
|
||||||
|
|
||||||
|
typedef sha256_ctx_t hmac_sha256_ctx_t;
|
||||||
|
|
||||||
|
|
||||||
|
void hmac_sha256_init(hmac_sha256_ctx_t *s, void* key, uint16_t kl);
|
||||||
|
void hmac_sha256_final(hmac_sha256_ctx_t *s, void* key, uint16_t kl);
|
||||||
|
void hmac_sha256(void* dest, void* key, uint16_t kl, void* msg, uint64_t ml);
|
||||||
|
|
||||||
|
|
||||||
|
#endif /*HMACSHA256_H_*/
|
|
@ -0,0 +1,233 @@
|
||||||
|
/*
|
||||||
|
* camellia test-suit
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "config.h"
|
||||||
|
#include "serial-tools.h"
|
||||||
|
#include "uart.h"
|
||||||
|
#include "debug.h"
|
||||||
|
|
||||||
|
#include "camellia.h"
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <avr/pgmspace.h>
|
||||||
|
|
||||||
|
|
||||||
|
#ifndef BOOL
|
||||||
|
#define BOOL
|
||||||
|
#ifndef __BOOL
|
||||||
|
#define __BOOL
|
||||||
|
#ifndef __BOOL__
|
||||||
|
#define __BOOL__
|
||||||
|
typedef enum{false=0,true=1} bool;
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/*****************************************************************************
|
||||||
|
* additional validation-functions *
|
||||||
|
*****************************************************************************/
|
||||||
|
|
||||||
|
/*****************************************************************************
|
||||||
|
* self tests *
|
||||||
|
*****************************************************************************/
|
||||||
|
void camellia128_ctx_dump(camellia128_ctx_t *s);
|
||||||
|
|
||||||
|
void test_encrypt(uint8_t *block, uint8_t *key, uint16_t keylength, bool print){
|
||||||
|
camellia128_ctx_t s;
|
||||||
|
if (print){
|
||||||
|
uart_putstr("\r\nCamellia (enc):\r\n key:\t\t");
|
||||||
|
uart_hexdump(key, keylength/8);
|
||||||
|
uart_putstr("\r\n plaintext:\t");
|
||||||
|
uart_hexdump(block, 16);
|
||||||
|
}
|
||||||
|
|
||||||
|
camellia128_init(&s, key);;
|
||||||
|
camellia128_enc(&s, block);
|
||||||
|
if (print){
|
||||||
|
uart_putstr("\r\n ciphertext:\t");
|
||||||
|
uart_hexdump(block, 16);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void test_decrypt(uint8_t *block, uint8_t *key, uint16_t keylength, bool print){
|
||||||
|
camellia128_ctx_t s;
|
||||||
|
if (print){
|
||||||
|
uart_putstr("\r\nCamellia (dec):\r\n key:\t\t");
|
||||||
|
uart_hexdump(key, keylength/8);
|
||||||
|
uart_putstr("\r\n ciphertext:\t");
|
||||||
|
uart_hexdump(block, 16);
|
||||||
|
}
|
||||||
|
camellia128_init(&s, key);
|
||||||
|
camellia128_dec(&s, block);
|
||||||
|
if (print){
|
||||||
|
uart_putstr("\r\n plaintext:\t");
|
||||||
|
uart_hexdump(block, 16);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void nessie_test_iterate(uint8_t *block, uint8_t *key){
|
||||||
|
uint16_t i;
|
||||||
|
test_encrypt(block, key, 128, true);
|
||||||
|
test_decrypt(block, key, 128, true);
|
||||||
|
uart_putstr("\r\n100 times:");
|
||||||
|
for(i=0; i<99; ++i){
|
||||||
|
test_encrypt(block, key, 128, false);
|
||||||
|
}
|
||||||
|
test_encrypt(block, key, 128, true);
|
||||||
|
uart_putstr("\r\n1000 times:");
|
||||||
|
for(i=0; i<(999-100); ++i){
|
||||||
|
test_encrypt(block, key, 128, false);
|
||||||
|
}
|
||||||
|
test_encrypt(block, key, 128, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
void nessie_test_iterate_inv(uint8_t *block, uint8_t *key){
|
||||||
|
uint16_t i;
|
||||||
|
test_decrypt(block, key, 128, true);
|
||||||
|
test_encrypt(block, key, 128, true);
|
||||||
|
uart_putstr("\r\n100 times:");
|
||||||
|
for(i=0; i<99; ++i){
|
||||||
|
test_decrypt(block, key, 128, false);
|
||||||
|
}
|
||||||
|
test_encrypt(block, key, 128, true);
|
||||||
|
uart_putstr("\r\n1000 times:");
|
||||||
|
for(i=0; i<(999-100); ++i){
|
||||||
|
test_decrypt(block, key, 128, false);
|
||||||
|
}
|
||||||
|
test_decrypt(block, key, 128, true);
|
||||||
|
}
|
||||||
|
|
||||||
|
prog_uint8_t ntt_test_values_in[16] = {
|
||||||
|
0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
|
||||||
|
0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10
|
||||||
|
};
|
||||||
|
|
||||||
|
prog_uint8_t ntt_test_values_out[16] = {
|
||||||
|
0x67, 0x67, 0x31, 0x38, 0x54, 0x96, 0x69, 0x73,
|
||||||
|
0x08, 0x57, 0x06, 0x56, 0x48, 0xea, 0xbe, 0x43
|
||||||
|
};
|
||||||
|
|
||||||
|
int memcmp_P(const void *s1, PGM_P s2, size_t n){
|
||||||
|
uint8_t b;
|
||||||
|
while(n--){
|
||||||
|
b = pgm_read_byte_near(s2);
|
||||||
|
if( *((uint8_t*)s1) != b)
|
||||||
|
return(*((uint8_t*)s1)-b);
|
||||||
|
++s1; ++s2;
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
void testrun_camellia(void){
|
||||||
|
/* we run the NESSIE test for Camellia here see
|
||||||
|
* https://www.cosic.esat.kuleuven.be/nessie/testvectors/bc/camellia/Camellia-128-128.verified.test-vectors
|
||||||
|
* for the vectors
|
||||||
|
*/
|
||||||
|
unsigned j, setn;
|
||||||
|
uint8_t block[16];
|
||||||
|
uint8_t key[16];
|
||||||
|
memcpy_P(block, ntt_test_values_in, 16);
|
||||||
|
memcpy_P(key, ntt_test_values_in, 16);
|
||||||
|
test_encrypt(block, key, 128, true);
|
||||||
|
if(memcmp_P(block, ntt_test_values_out, 16)){
|
||||||
|
uart_putstr("\t[FAILED]\r\n");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
uart_putstr("\t[OK]");
|
||||||
|
test_decrypt(block, key, 128, true);
|
||||||
|
if(memcmp_P(block, ntt_test_values_in, 16)){
|
||||||
|
uart_putstr("\t[FAILED]\r\n");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
uart_putstr("\t[OK]");
|
||||||
|
|
||||||
|
/* test set #1 & #2 */
|
||||||
|
setn=1;
|
||||||
|
for(setn=1; setn<=2; ++setn){
|
||||||
|
for(j=0; j<128; ++j){
|
||||||
|
uart_putstr("\r\n\r\n### SET: ");
|
||||||
|
uart_hexdump(&setn,1);
|
||||||
|
uart_putstr(" Vector: ");
|
||||||
|
uart_hexdump(&j,1);
|
||||||
|
|
||||||
|
memset(block, 0, 16);
|
||||||
|
memset(key, 0, 16);
|
||||||
|
((setn&0x1)?key:block)[j>>3] = 1<<(((~j)&0x7));
|
||||||
|
nessie_test_iterate(block, key);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
/* test set #3 */
|
||||||
|
for(j=0; j<256; ++j){
|
||||||
|
uart_putstr("\r\n### SET: ");
|
||||||
|
uart_hexdump(&setn,1);
|
||||||
|
uart_putstr(" Vector: ");
|
||||||
|
uart_hexdump(&j,1);
|
||||||
|
|
||||||
|
memset(block, j, 16);
|
||||||
|
memset(key, 0, 16);
|
||||||
|
nessie_test_iterate(block, key);
|
||||||
|
}
|
||||||
|
setn++;
|
||||||
|
/* test set #4 (some strange values*/
|
||||||
|
setn++;
|
||||||
|
/* test ser #5 & #6 (same as 1&2 but enc and dec exchanged)*/
|
||||||
|
for(setn=5; setn<=6; ++setn){
|
||||||
|
for(j=0; j<128; ++j){
|
||||||
|
uart_putstr("\r\n\r\n### SET: ");
|
||||||
|
uart_hexdump(&setn,1);
|
||||||
|
uart_putstr(" Vector: ");
|
||||||
|
uart_hexdump(&j,1);
|
||||||
|
|
||||||
|
memset(block, 0, 16);
|
||||||
|
memset(key, 0, 16);
|
||||||
|
((setn&0x1)?key:block)[j>>3] = 1<<(((~j)&0x7));
|
||||||
|
nessie_test_iterate_inv(block, key);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
/* test set #7 */
|
||||||
|
for(j=0; j<256; ++j){
|
||||||
|
uart_putstr("\r\n### SET: ");
|
||||||
|
uart_hexdump(&setn,1);
|
||||||
|
uart_putstr(" Vector: ");
|
||||||
|
uart_hexdump(&j,1);
|
||||||
|
|
||||||
|
memset(block, j, 16);
|
||||||
|
memset(key, 0, 16);
|
||||||
|
nessie_test_iterate_inv(block, key);
|
||||||
|
}
|
||||||
|
setn++;
|
||||||
|
/* test set #4 (some strange values*/
|
||||||
|
setn++;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/*****************************************************************************
|
||||||
|
* main *
|
||||||
|
*****************************************************************************/
|
||||||
|
|
||||||
|
int main (void){
|
||||||
|
char str[20];
|
||||||
|
|
||||||
|
|
||||||
|
DEBUG_INIT();
|
||||||
|
uart_putstr("\r\n");
|
||||||
|
|
||||||
|
uart_putstr("\r\n\r\nCrypto-VS (Camellia)\r\nloaded and running\r\n");
|
||||||
|
restart:
|
||||||
|
while(1){
|
||||||
|
if (!getnextwordn(str,20)) {DEBUG_S("DBG: W1\r\n"); goto error;}
|
||||||
|
if (strcmp(str, "test")) {DEBUG_S("DBG: 1b\r\n"); goto error;}
|
||||||
|
testrun_camellia();
|
||||||
|
goto restart;
|
||||||
|
continue;
|
||||||
|
error:
|
||||||
|
uart_putstr("ERROR\r\n");
|
||||||
|
} /* while (1) */
|
||||||
|
}
|
||||||
|
|
|
@ -0,0 +1,81 @@
|
||||||
|
/*
|
||||||
|
* md5 test suit
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "config.h"
|
||||||
|
#include "serial-tools.h"
|
||||||
|
#include "uart.h"
|
||||||
|
#include "debug.h"
|
||||||
|
|
||||||
|
#include "md5.h"
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
|
||||||
|
/*****************************************************************************
|
||||||
|
* additional validation-functions *
|
||||||
|
*****************************************************************************/
|
||||||
|
|
||||||
|
/*****************************************************************************
|
||||||
|
* self tests *
|
||||||
|
*****************************************************************************/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* MD5 test suite:
|
||||||
|
* MD5 ("") = d41d8cd98f00b204e9800998ecf8427e
|
||||||
|
* MD5 ("a") = 0cc175b9c0f1b6a831c399e269772661
|
||||||
|
* MD5 ("abc") = 900150983cd24fb0d6963f7d28e17f72
|
||||||
|
* MD5 ("message digest") = f96b697d7cb7938d525a2f31aaf161d0
|
||||||
|
* MD5 ("abcdefghijklmnopqrstuvwxyz") = c3fcd3d76192e4007dfb496cca67e13b
|
||||||
|
* MD5 ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") =
|
||||||
|
* d174ab98d277d9f5a5611c2c9f419d9f
|
||||||
|
* MD5 ("123456789012345678901234567890123456789012345678901234567890123456
|
||||||
|
* 78901234567890") = 57edf4a22be3c955ac49da2e2107b67a
|
||||||
|
*/
|
||||||
|
|
||||||
|
void testrun_md5(void){
|
||||||
|
md5_ctx_t s;
|
||||||
|
char* testv[]={"", "a", "abc", "message digest", "abcdefghijklmnopqrstuvwxyz",
|
||||||
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
|
||||||
|
"12345678901234567890123456789012345678901234567890123456789012345678901234567890"};
|
||||||
|
uint8_t i;
|
||||||
|
|
||||||
|
uart_putstr("\r\n=== MD5 test suit ===");
|
||||||
|
for(i=0; i<7; ++i){
|
||||||
|
uart_putstr("\r\n MD5 (\"");
|
||||||
|
uart_putstr(testv[i]);
|
||||||
|
uart_putstr("\") = \r\n");
|
||||||
|
md5_init(&s);
|
||||||
|
md5_lastBlock(&s, testv[i], strlen(testv[i])*8);
|
||||||
|
uart_hexdump(&s.a[0], 16);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/*****************************************************************************
|
||||||
|
* main *
|
||||||
|
*****************************************************************************/
|
||||||
|
|
||||||
|
int main (void){
|
||||||
|
char str[20];
|
||||||
|
|
||||||
|
|
||||||
|
DEBUG_INIT();
|
||||||
|
uart_putstr("\r\n");
|
||||||
|
|
||||||
|
uart_putstr("\r\n\r\nCrypto-VS (MD5)\r\nloaded and running\r\n");
|
||||||
|
restart:
|
||||||
|
while(1){
|
||||||
|
if (!getnextwordn(str,20)) {DEBUG_S("DBG: W1\r\n"); goto error;}
|
||||||
|
if (strcmp(str, "test")) {DEBUG_S("DBG: 1b\r\n"); goto error;}
|
||||||
|
testrun_md5();
|
||||||
|
goto restart;
|
||||||
|
continue;
|
||||||
|
error:
|
||||||
|
uart_putstr("ERROR\r\n");
|
||||||
|
} /* while (1) */
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in New Issue