netwerk/srtp/src/crypto/include/gf2_8.h

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 /*
michael@0 2 * gf2_8.h
michael@0 3 *
michael@0 4 * GF(256) implementation
michael@0 5 *
michael@0 6 * David A. McGrew
michael@0 7 * Cisco Systems, Inc.
michael@0 8 */
michael@0 9
michael@0 10 /*
michael@0 11 *
michael@0 12 * Copyright (c) 2001-2006, Cisco Systems, Inc.
michael@0 13 * All rights reserved.
michael@0 14 *
michael@0 15 * Redistribution and use in source and binary forms, with or without
michael@0 16 * modification, are permitted provided that the following conditions
michael@0 17 * are met:
michael@0 18 *
michael@0 19 * Redistributions of source code must retain the above copyright
michael@0 20 * notice, this list of conditions and the following disclaimer.
michael@0 21 *
michael@0 22 * Redistributions in binary form must reproduce the above
michael@0 23 * copyright notice, this list of conditions and the following
michael@0 24 * disclaimer in the documentation and/or other materials provided
michael@0 25 * with the distribution.
michael@0 26 *
michael@0 27 * Neither the name of the Cisco Systems, Inc. nor the names of its
michael@0 28 * contributors may be used to endorse or promote products derived
michael@0 29 * from this software without specific prior written permission.
michael@0 30 *
michael@0 31 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
michael@0 32 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
michael@0 33 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
michael@0 34 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
michael@0 35 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
michael@0 36 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
michael@0 37 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
michael@0 38 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
michael@0 39 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
michael@0 40 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
michael@0 41 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
michael@0 42 * OF THE POSSIBILITY OF SUCH DAMAGE.
michael@0 43 *
michael@0 44 */
michael@0 45
michael@0 46
michael@0 47 #ifndef GF2_8_H
michael@0 48 #define GF2_8_H
michael@0 49
michael@0 50 #include "datatypes.h" /* for uint8_t definition */
michael@0 51
michael@0 52 typedef uint8_t gf2_8;
michael@0 53
michael@0 54 #define gf2_8_field_polynomial 0x1B
michael@0 55
michael@0 56 /*
michael@0 57 * gf2_8_shift(x) returns
michael@0 58 */
michael@0 59
michael@0 60 /*
michael@0 61 * gf2_8_shift(z) returns the result of the GF(2^8) 'multiply by x'
michael@0 62 * operation, using the field representation from AES; that is, the
michael@0 63 * next gf2_8 value in the cyclic representation of that field. The
michael@0 64 * value z should be an uint8_t.
michael@0 65 */
michael@0 66
michael@0 67 #define gf2_8_shift(z) (((z) & 128) ? \
michael@0 68 (((z) << 1) ^ gf2_8_field_polynomial) : ((z) << 1))
michael@0 69
michael@0 70 gf2_8
michael@0 71 gf2_8_compute_inverse(gf2_8 x);
michael@0 72
michael@0 73 void
michael@0 74 test_gf2_8(void);
michael@0 75
michael@0 76 gf2_8
michael@0 77 gf2_8_multiply(gf2_8 x, gf2_8 y);
michael@0 78
michael@0 79 #endif /* GF2_8_H */

mercurial