Path: blob/main/contrib/bearssl/src/symcipher/aes_ct64_dec.c
39482 views
/*1* Copyright (c) 2016 Thomas Pornin <[email protected]>2*3* Permission is hereby granted, free of charge, to any person obtaining4* a copy of this software and associated documentation files (the5* "Software"), to deal in the Software without restriction, including6* without limitation the rights to use, copy, modify, merge, publish,7* distribute, sublicense, and/or sell copies of the Software, and to8* permit persons to whom the Software is furnished to do so, subject to9* the following conditions:10*11* The above copyright notice and this permission notice shall be12* included in all copies or substantial portions of the Software.13*14* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,15* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF16* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND17* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS18* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN19* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN20* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE21* SOFTWARE.22*/2324#include "inner.h"2526/* see inner.h */27void28br_aes_ct64_bitslice_invSbox(uint64_t *q)29{30/*31* See br_aes_ct_bitslice_invSbox(). This is the natural extension32* to 64-bit registers.33*/34uint64_t q0, q1, q2, q3, q4, q5, q6, q7;3536q0 = ~q[0];37q1 = ~q[1];38q2 = q[2];39q3 = q[3];40q4 = q[4];41q5 = ~q[5];42q6 = ~q[6];43q7 = q[7];44q[7] = q1 ^ q4 ^ q6;45q[6] = q0 ^ q3 ^ q5;46q[5] = q7 ^ q2 ^ q4;47q[4] = q6 ^ q1 ^ q3;48q[3] = q5 ^ q0 ^ q2;49q[2] = q4 ^ q7 ^ q1;50q[1] = q3 ^ q6 ^ q0;51q[0] = q2 ^ q5 ^ q7;5253br_aes_ct64_bitslice_Sbox(q);5455q0 = ~q[0];56q1 = ~q[1];57q2 = q[2];58q3 = q[3];59q4 = q[4];60q5 = ~q[5];61q6 = ~q[6];62q7 = q[7];63q[7] = q1 ^ q4 ^ q6;64q[6] = q0 ^ q3 ^ q5;65q[5] = q7 ^ q2 ^ q4;66q[4] = q6 ^ q1 ^ q3;67q[3] = q5 ^ q0 ^ q2;68q[2] = q4 ^ q7 ^ q1;69q[1] = q3 ^ q6 ^ q0;70q[0] = q2 ^ q5 ^ q7;71}7273static void74add_round_key(uint64_t *q, const uint64_t *sk)75{76int i;7778for (i = 0; i < 8; i ++) {79q[i] ^= sk[i];80}81}8283static void84inv_shift_rows(uint64_t *q)85{86int i;8788for (i = 0; i < 8; i ++) {89uint64_t x;9091x = q[i];92q[i] = (x & (uint64_t)0x000000000000FFFF)93| ((x & (uint64_t)0x000000000FFF0000) << 4)94| ((x & (uint64_t)0x00000000F0000000) >> 12)95| ((x & (uint64_t)0x000000FF00000000) << 8)96| ((x & (uint64_t)0x0000FF0000000000) >> 8)97| ((x & (uint64_t)0x000F000000000000) << 12)98| ((x & (uint64_t)0xFFF0000000000000) >> 4);99}100}101102static inline uint64_t103rotr32(uint64_t x)104{105return (x << 32) | (x >> 32);106}107108static void109inv_mix_columns(uint64_t *q)110{111uint64_t q0, q1, q2, q3, q4, q5, q6, q7;112uint64_t r0, r1, r2, r3, r4, r5, r6, r7;113114q0 = q[0];115q1 = q[1];116q2 = q[2];117q3 = q[3];118q4 = q[4];119q5 = q[5];120q6 = q[6];121q7 = q[7];122r0 = (q0 >> 16) | (q0 << 48);123r1 = (q1 >> 16) | (q1 << 48);124r2 = (q2 >> 16) | (q2 << 48);125r3 = (q3 >> 16) | (q3 << 48);126r4 = (q4 >> 16) | (q4 << 48);127r5 = (q5 >> 16) | (q5 << 48);128r6 = (q6 >> 16) | (q6 << 48);129r7 = (q7 >> 16) | (q7 << 48);130131q[0] = q5 ^ q6 ^ q7 ^ r0 ^ r5 ^ r7 ^ rotr32(q0 ^ q5 ^ q6 ^ r0 ^ r5);132q[1] = q0 ^ q5 ^ r0 ^ r1 ^ r5 ^ r6 ^ r7 ^ rotr32(q1 ^ q5 ^ q7 ^ r1 ^ r5 ^ r6);133q[2] = q0 ^ q1 ^ q6 ^ r1 ^ r2 ^ r6 ^ r7 ^ rotr32(q0 ^ q2 ^ q6 ^ r2 ^ r6 ^ r7);134q[3] = q0 ^ q1 ^ q2 ^ q5 ^ q6 ^ r0 ^ r2 ^ r3 ^ r5 ^ rotr32(q0 ^ q1 ^ q3 ^ q5 ^ q6 ^ q7 ^ r0 ^ r3 ^ r5 ^ r7);135q[4] = q1 ^ q2 ^ q3 ^ q5 ^ r1 ^ r3 ^ r4 ^ r5 ^ r6 ^ r7 ^ rotr32(q1 ^ q2 ^ q4 ^ q5 ^ q7 ^ r1 ^ r4 ^ r5 ^ r6);136q[5] = q2 ^ q3 ^ q4 ^ q6 ^ r2 ^ r4 ^ r5 ^ r6 ^ r7 ^ rotr32(q2 ^ q3 ^ q5 ^ q6 ^ r2 ^ r5 ^ r6 ^ r7);137q[6] = q3 ^ q4 ^ q5 ^ q7 ^ r3 ^ r5 ^ r6 ^ r7 ^ rotr32(q3 ^ q4 ^ q6 ^ q7 ^ r3 ^ r6 ^ r7);138q[7] = q4 ^ q5 ^ q6 ^ r4 ^ r6 ^ r7 ^ rotr32(q4 ^ q5 ^ q7 ^ r4 ^ r7);139}140141/* see inner.h */142void143br_aes_ct64_bitslice_decrypt(unsigned num_rounds,144const uint64_t *skey, uint64_t *q)145{146unsigned u;147148add_round_key(q, skey + (num_rounds << 3));149for (u = num_rounds - 1; u > 0; u --) {150inv_shift_rows(q);151br_aes_ct64_bitslice_invSbox(q);152add_round_key(q, skey + (u << 3));153inv_mix_columns(q);154}155inv_shift_rows(q);156br_aes_ct64_bitslice_invSbox(q);157add_round_key(q, skey);158}159160161