netwerk/srtp/src/crypto/include/gf2_8.h

changeset 0
6474c204b198
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/netwerk/srtp/src/crypto/include/gf2_8.h	Wed Dec 31 06:09:35 2014 +0100
     1.3 @@ -0,0 +1,79 @@
     1.4 +/*
     1.5 + * gf2_8.h
     1.6 + *
     1.7 + * GF(256) implementation
     1.8 + *
     1.9 + * David A. McGrew
    1.10 + * Cisco Systems, Inc.
    1.11 + */
    1.12 +
    1.13 +/*
    1.14 + *	
    1.15 + * Copyright (c) 2001-2006, Cisco Systems, Inc.
    1.16 + * All rights reserved.
    1.17 + * 
    1.18 + * Redistribution and use in source and binary forms, with or without
    1.19 + * modification, are permitted provided that the following conditions
    1.20 + * are met:
    1.21 + * 
    1.22 + *   Redistributions of source code must retain the above copyright
    1.23 + *   notice, this list of conditions and the following disclaimer.
    1.24 + * 
    1.25 + *   Redistributions in binary form must reproduce the above
    1.26 + *   copyright notice, this list of conditions and the following
    1.27 + *   disclaimer in the documentation and/or other materials provided
    1.28 + *   with the distribution.
    1.29 + * 
    1.30 + *   Neither the name of the Cisco Systems, Inc. nor the names of its
    1.31 + *   contributors may be used to endorse or promote products derived
    1.32 + *   from this software without specific prior written permission.
    1.33 + * 
    1.34 + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
    1.35 + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
    1.36 + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
    1.37 + * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
    1.38 + * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
    1.39 + * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
    1.40 + * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
    1.41 + * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    1.42 + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
    1.43 + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
    1.44 + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
    1.45 + * OF THE POSSIBILITY OF SUCH DAMAGE.
    1.46 + *
    1.47 + */
    1.48 +
    1.49 +
    1.50 +#ifndef GF2_8_H
    1.51 +#define GF2_8_H
    1.52 +
    1.53 +#include "datatypes.h"  /* for uint8_t definition */
    1.54 +
    1.55 +typedef uint8_t gf2_8;
    1.56 +
    1.57 +#define gf2_8_field_polynomial 0x1B
    1.58 +
    1.59 +/*
    1.60 + * gf2_8_shift(x) returns 
    1.61 + */
    1.62 +
    1.63 +/*
    1.64 + * gf2_8_shift(z) returns the result of the GF(2^8) 'multiply by x' 
    1.65 + * operation, using the field representation from AES; that is, the 
    1.66 + * next gf2_8 value in the cyclic representation of that field.  The 
    1.67 + * value z should be an uint8_t.
    1.68 + */
    1.69 +
    1.70 +#define gf2_8_shift(z) (((z) & 128) ? \
    1.71 +       (((z) << 1) ^ gf2_8_field_polynomial) : ((z) << 1))
    1.72 +
    1.73 +gf2_8
    1.74 +gf2_8_compute_inverse(gf2_8 x);
    1.75 +
    1.76 +void
    1.77 +test_gf2_8(void);
    1.78 +
    1.79 +gf2_8
    1.80 +gf2_8_multiply(gf2_8 x, gf2_8 y);
    1.81 +
    1.82 +#endif /* GF2_8_H */

mercurial