summaryrefslogtreecommitdiff
path: root/src/ltc/ciphers
diff options
context:
space:
mode:
authorKarel Miko <karel.miko@gmail.com>2020-12-01 12:28:50 +0100
committerKarel Miko <karel.miko@gmail.com>2020-12-01 12:28:50 +0100
commit1644699159cf0fe410407393a9a7407102e4a60d (patch)
tree9b221274519220a89c0caadab01922c812e0f419 /src/ltc/ciphers
parentf194f27a0f15c0ea0f978ef12d3cbb8c81bcbc73 (diff)
libtomcrypt upgrade
Diffstat (limited to 'src/ltc/ciphers')
-rw-r--r--src/ltc/ciphers/aes/aes.c10
-rw-r--r--src/ltc/ciphers/aes/aes_tab.c4
-rw-r--r--src/ltc/ciphers/anubis.c4
-rw-r--r--src/ltc/ciphers/blowfish.c8
-rw-r--r--src/ltc/ciphers/cast5.c24
-rw-r--r--src/ltc/ciphers/des.c12
-rw-r--r--src/ltc/ciphers/idea.c90
-rw-r--r--src/ltc/ciphers/multi2.c54
-rw-r--r--src/ltc/ciphers/noekeon.c8
-rw-r--r--src/ltc/ciphers/rc2.c8
-rw-r--r--src/ltc/ciphers/rc5.c12
-rw-r--r--src/ltc/ciphers/rc6.c12
-rw-r--r--src/ltc/ciphers/safer/safer.c26
-rw-r--r--src/ltc/ciphers/safer/safer_tab.c4
-rw-r--r--src/ltc/ciphers/safer/saferp.c18
-rw-r--r--src/ltc/ciphers/serpent.c148
-rw-r--r--src/ltc/ciphers/skipjack.c8
-rw-r--r--src/ltc/ciphers/twofish/twofish.c22
-rw-r--r--src/ltc/ciphers/twofish/twofish_tab.c4
19 files changed, 235 insertions, 241 deletions
diff --git a/src/ltc/ciphers/aes/aes.c b/src/ltc/ciphers/aes/aes.c
index 9e1bb399..dd6f14e8 100644
--- a/src/ltc/ciphers/aes/aes.c
+++ b/src/ltc/ciphers/aes/aes.c
@@ -80,7 +80,7 @@ const struct ltc_cipher_descriptor aes_enc_desc =
#endif
-#define __LTC_AES_TAB_C__
+#define LTC_AES_TAB_C
#include "aes_tab.c"
static ulong32 setup_mix(ulong32 temp)
@@ -275,7 +275,7 @@ int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *s
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rijndael_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_rijndael_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -443,7 +443,7 @@ int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *ske
#ifdef LTC_CLEAN_STACK
int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _rijndael_ecb_encrypt(pt, ct, skey);
+ int err = s_rijndael_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(unsigned long)*8 + sizeof(unsigned long*) + sizeof(int)*2);
return err;
}
@@ -459,7 +459,7 @@ int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *ske
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rijndael_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_rijndael_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int ECB_DEC(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -628,7 +628,7 @@ int ECB_DEC(const unsigned char *ct, unsigned char *pt, const symmetric_key *ske
#ifdef LTC_CLEAN_STACK
int ECB_DEC(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _rijndael_ecb_decrypt(ct, pt, skey);
+ int err = s_rijndael_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(unsigned long)*8 + sizeof(unsigned long*) + sizeof(int)*2);
return err;
}
diff --git a/src/ltc/ciphers/aes/aes_tab.c b/src/ltc/ciphers/aes/aes_tab.c
index 4dfa1436..5e590041 100644
--- a/src/ltc/ciphers/aes/aes_tab.c
+++ b/src/ltc/ciphers/aes/aes_tab.c
@@ -15,7 +15,7 @@ Td3[x] = Si[x].[09, 0d, 0b, 0e];
Td4[x] = Si[x].[01, 01, 01, 01];
*/
-#ifdef __LTC_AES_TAB_C__
+#ifdef LTC_AES_TAB_C
/**
@file aes_tab.c
@@ -1019,4 +1019,4 @@ static const ulong32 rcon[] = {
};
#endif
-#endif /* __LTC_AES_TAB_C__ */
+#endif /* LTC_AES_TAB_C */
diff --git a/src/ltc/ciphers/anubis.c b/src/ltc/ciphers/anubis.c
index 07cb5d3a..f6a1c58d 100644
--- a/src/ltc/ciphers/anubis.c
+++ b/src/ltc/ciphers/anubis.c
@@ -876,7 +876,7 @@ static const ulong32 rc[] = {
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
+static int s_anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#else
int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#endif
@@ -1013,7 +1013,7 @@ int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
{
int err;
- err = _anubis_setup(key, keylen, num_rounds, skey);
+ err = s_anubis_setup(key, keylen, num_rounds, skey);
burn_stack(sizeof(int) * 5 + sizeof(ulong32) * (MAX_N + MAX_N + 5));
return err;
}
diff --git a/src/ltc/ciphers/blowfish.c b/src/ltc/ciphers/blowfish.c
index a0eaf36a..35efc137 100644
--- a/src/ltc/ciphers/blowfish.c
+++ b/src/ltc/ciphers/blowfish.c
@@ -472,7 +472,7 @@ int blowfish_setup_with_data(const unsigned char *key, int keylen,
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -499,7 +499,7 @@ int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme
#ifdef LTC_CLEAN_STACK
int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _blowfish_ecb_encrypt(pt, ct, skey);
+ int err = s_blowfish_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(ulong32) * 2 + sizeof(int));
return err;
}
@@ -513,7 +513,7 @@ int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -560,7 +560,7 @@ int blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symme
#ifdef LTC_CLEAN_STACK
int blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _blowfish_ecb_decrypt(ct, pt, skey);
+ int err = s_blowfish_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(ulong32) * 2 + sizeof(int));
return err;
}
diff --git a/src/ltc/ciphers/cast5.c b/src/ltc/ciphers/cast5.c
index 3672f3e2..3b401a5c 100644
--- a/src/ltc/ciphers/cast5.c
+++ b/src/ltc/ciphers/cast5.c
@@ -398,7 +398,7 @@ static const ulong32 S8[256] = {
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
+static int s_cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#else
int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#endif
@@ -485,19 +485,13 @@ int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_
int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
{
int z;
- z = _cast5_setup(key, keylen, num_rounds, skey);
+ z = s_cast5_setup(key, keylen, num_rounds, skey);
burn_stack(sizeof(ulong32)*8 + 16 + sizeof(int)*2);
return z;
}
#endif
-#ifdef _MSC_VER
- #define INLINE __inline
-#else
- #define INLINE
-#endif
-
-INLINE static ulong32 FI(ulong32 R, ulong32 Km, ulong32 Kr)
+LTC_INLINE static ulong32 FI(ulong32 R, ulong32 Km, ulong32 Kr)
{
ulong32 I;
I = (Km + R);
@@ -505,7 +499,7 @@ INLINE static ulong32 FI(ulong32 R, ulong32 Km, ulong32 Kr)
return ((S1[LTC_BYTE(I, 3)] ^ S2[LTC_BYTE(I,2)]) - S3[LTC_BYTE(I,1)]) + S4[LTC_BYTE(I,0)];
}
-INLINE static ulong32 FII(ulong32 R, ulong32 Km, ulong32 Kr)
+LTC_INLINE static ulong32 FII(ulong32 R, ulong32 Km, ulong32 Kr)
{
ulong32 I;
I = (Km ^ R);
@@ -513,7 +507,7 @@ INLINE static ulong32 FII(ulong32 R, ulong32 Km, ulong32 Kr)
return ((S1[LTC_BYTE(I, 3)] - S2[LTC_BYTE(I,2)]) + S3[LTC_BYTE(I,1)]) ^ S4[LTC_BYTE(I,0)];
}
-INLINE static ulong32 FIII(ulong32 R, ulong32 Km, ulong32 Kr)
+LTC_INLINE static ulong32 FIII(ulong32 R, ulong32 Km, ulong32 Kr)
{
ulong32 I;
I = (Km - R);
@@ -528,7 +522,7 @@ INLINE static ulong32 FIII(ulong32 R, ulong32 Km, ulong32 Kr)
@param skey The key as scheduled
*/
#ifdef LTC_CLEAN_STACK
-static int _cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -568,7 +562,7 @@ int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetri
#ifdef LTC_CLEAN_STACK
int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err =_cast5_ecb_encrypt(pt,ct,skey);
+ int err = s_cast5_ecb_encrypt(pt,ct,skey);
burn_stack(sizeof(ulong32)*3);
return err;
}
@@ -581,7 +575,7 @@ int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetri
@param skey The key as scheduled
*/
#ifdef LTC_CLEAN_STACK
-static int _cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -621,7 +615,7 @@ int cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetri
#ifdef LTC_CLEAN_STACK
int cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _cast5_ecb_decrypt(ct,pt,skey);
+ int err = s_cast5_ecb_decrypt(ct,pt,skey);
burn_stack(sizeof(ulong32)*3);
return err;
}
diff --git a/src/ltc/ciphers/des.c b/src/ltc/ciphers/des.c
index 5d77b5d6..5d00720c 100644
--- a/src/ltc/ciphers/des.c
+++ b/src/ltc/ciphers/des.c
@@ -1293,7 +1293,7 @@ static const ulong64 des_fp[8][256] = {
static void cookey(const ulong32 *raw1, ulong32 *keyout);
#ifdef LTC_CLEAN_STACK
-static void _deskey(const unsigned char *key, short edf, ulong32 *keyout)
+static void s_deskey(const unsigned char *key, short edf, ulong32 *keyout)
#else
static void deskey(const unsigned char *key, short edf, ulong32 *keyout)
#endif
@@ -1347,13 +1347,13 @@ static void deskey(const unsigned char *key, short edf, ulong32 *keyout)
#ifdef LTC_CLEAN_STACK
static void deskey(const unsigned char *key, short edf, ulong32 *keyout)
{
- _deskey(key, edf, keyout);
+ s_deskey(key, edf, keyout);
burn_stack(sizeof(int)*5 + sizeof(ulong32)*32 + sizeof(unsigned char)*112);
}
#endif
#ifdef LTC_CLEAN_STACK
-static void _cookey(const ulong32 *raw1, ulong32 *keyout)
+static void s_cookey(const ulong32 *raw1, ulong32 *keyout)
#else
static void cookey(const ulong32 *raw1, ulong32 *keyout)
#endif
@@ -1383,7 +1383,7 @@ static void cookey(const ulong32 *raw1, ulong32 *keyout)
#ifdef LTC_CLEAN_STACK
static void cookey(const ulong32 *raw1, ulong32 *keyout)
{
- _cookey(raw1, keyout);
+ s_cookey(raw1, keyout);
burn_stack(sizeof(ulong32 *) * 2 + sizeof(ulong32)*32 + sizeof(int));
}
#endif
@@ -1391,7 +1391,7 @@ static void cookey(const ulong32 *raw1, ulong32 *keyout)
#ifndef LTC_CLEAN_STACK
static void desfunc(ulong32 *block, const ulong32 *keys)
#else
-static void _desfunc(ulong32 *block, const ulong32 *keys)
+static void s_desfunc(ulong32 *block, const ulong32 *keys)
#endif
{
ulong32 work, right, leftt;
@@ -1505,7 +1505,7 @@ static void _desfunc(ulong32 *block, const ulong32 *keys)
#ifdef LTC_CLEAN_STACK
static void desfunc(ulong32 *block, const ulong32 *keys)
{
- _desfunc(block, keys);
+ s_desfunc(block, keys);
burn_stack(sizeof(ulong32) * 4 + sizeof(int));
}
#endif
diff --git a/src/ltc/ciphers/idea.c b/src/ltc/ciphers/idea.c
index 27db6167..b195a4c9 100644
--- a/src/ltc/ciphers/idea.c
+++ b/src/ltc/ciphers/idea.c
@@ -35,38 +35,38 @@ const struct ltc_cipher_descriptor idea_desc = {
typedef unsigned short int ushort16;
-#define _LOW16(x) ((x)&0xffff) /* compiler should be able to optimize this away if x is 16 bits */
-#define _HIGH16(x) ((x)>>16)
-#define _MUL(a,b) { \
- ulong32 p = (ulong32)_LOW16(a) * b; \
+#define LOW16(x) ((x)&0xffff) /* compiler should be able to optimize this away if x is 16 bits */
+#define HIGH16(x) ((x)>>16)
+#define MUL(a,b) { \
+ ulong32 p = (ulong32)LOW16(a) * b; \
if (p) { \
- p = _LOW16(p) - _HIGH16(p); \
- a = (ushort16)p - (ushort16)_HIGH16(p); \
+ p = LOW16(p) - HIGH16(p); \
+ a = (ushort16)p - (ushort16)HIGH16(p); \
} \
else \
a = 1 - a - b; \
}
-#define _STORE16(x,y) { (y)[0] = (unsigned char)(((x)>>8)&255); (y)[1] = (unsigned char)((x)&255); }
-#define _LOAD16(x,y) { x = ((ushort16)((y)[0] & 255)<<8) | ((ushort16)((y)[1] & 255)); }
+#define STORE16(x,y) { (y)[0] = (unsigned char)(((x)>>8)&255); (y)[1] = (unsigned char)((x)&255); }
+#define LOAD16(x,y) { x = ((ushort16)((y)[0] & 255)<<8) | ((ushort16)((y)[1] & 255)); }
-static ushort16 _mul_inv(ushort16 x)
+static ushort16 s_mul_inv(ushort16 x)
{
ushort16 y = x;
unsigned i;
for (i = 0; i < 15; i++) {
- _MUL(y, _LOW16(y));
- _MUL(y, x);
+ MUL(y, LOW16(y));
+ MUL(y, x);
}
- return _LOW16(y);
+ return LOW16(y);
}
-static ushort16 _add_inv(ushort16 x)
+static ushort16 s_add_inv(ushort16 x)
{
- return _LOW16(0 - x);
+ return LOW16(0 - x);
}
-static int _setup_key(const unsigned char *key, symmetric_key *skey)
+static int s_setup_key(const unsigned char *key, symmetric_key *skey)
{
int i, j;
ushort16 *e_key = skey->idea.ek;
@@ -74,49 +74,49 @@ static int _setup_key(const unsigned char *key, symmetric_key *skey)
/* prepare enc key */
for (i = 0; i < 8; i++) {
- _LOAD16(e_key[i], key + 2 * i);
+ LOAD16(e_key[i], key + 2 * i);
}
for (; i < LTC_IDEA_KEYLEN; i++) {
j = (i - i % 8) - 8;
- e_key[i] = _LOW16((e_key[j+(i+1)%8] << 9) | (e_key[j+(i+2)%8] >> 7));
+ e_key[i] = LOW16((e_key[j+(i+1)%8] << 9) | (e_key[j+(i+2)%8] >> 7));
}
/* prepare dec key */
for (i = 0; i < LTC_IDEA_ROUNDS; i++) {
- d_key[i*6+0] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]);
- d_key[i*6+1] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1+(i>0 ? 1 : 0)]);
- d_key[i*6+2] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2-(i>0 ? 1 : 0)]);
- d_key[i*6+3] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]);
- d_key[i*6+4] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+4];
- d_key[i*6+5] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+5];
+ d_key[i*6+0] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]);
+ d_key[i*6+1] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1+(i>0 ? 1 : 0)]);
+ d_key[i*6+2] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2-(i>0 ? 1 : 0)]);
+ d_key[i*6+3] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]);
+ d_key[i*6+4] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+4];
+ d_key[i*6+5] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+5];
}
- d_key[i*6+0] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]);
- d_key[i*6+1] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1]);
- d_key[i*6+2] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2]);
- d_key[i*6+3] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]);
+ d_key[i*6+0] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]);
+ d_key[i*6+1] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1]);
+ d_key[i*6+2] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2]);
+ d_key[i*6+3] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]);
return CRYPT_OK;
}
-static int _process_block(const unsigned char *in, unsigned char *out, const ushort16 *m_key)
+static int s_process_block(const unsigned char *in, unsigned char *out, const ushort16 *m_key)
{
int i;
ushort16 x0, x1, x2, x3, t0, t1;
- _LOAD16(x0, in + 0);
- _LOAD16(x1, in + 2);
- _LOAD16(x2, in + 4);
- _LOAD16(x3, in + 6);
+ LOAD16(x0, in + 0);
+ LOAD16(x1, in + 2);
+ LOAD16(x2, in + 4);
+ LOAD16(x3, in + 6);
for (i = 0; i < LTC_IDEA_ROUNDS; i++) {
- _MUL(x0, m_key[i*6+0]);
+ MUL(x0, m_key[i*6+0]);
x1 += m_key[i*6+1];
x2 += m_key[i*6+2];
- _MUL(x3, m_key[i*6+3]);
+ MUL(x3, m_key[i*6+3]);
t0 = x0^x2;
- _MUL(t0, m_key[i*6+4]);
+ MUL(t0, m_key[i*6+4]);
t1 = t0 + (x1^x3);
- _MUL(t1, m_key[i*6+5]);
+ MUL(t1, m_key[i*6+5]);
t0 += t1;
x0 ^= t1;
x3 ^= t0;
@@ -125,15 +125,15 @@ static int _process_block(const unsigned char *in, unsigned char *out, const ush
x2 = t0;
}
- _MUL(x0, m_key[LTC_IDEA_ROUNDS*6+0]);
+ MUL(x0, m_key[LTC_IDEA_ROUNDS*6+0]);
x2 += m_key[LTC_IDEA_ROUNDS*6+1];
x1 += m_key[LTC_IDEA_ROUNDS*6+2];
- _MUL(x3, m_key[LTC_IDEA_ROUNDS*6+3]);
+ MUL(x3, m_key[LTC_IDEA_ROUNDS*6+3]);
- _STORE16(x0, out + 0);
- _STORE16(x2, out + 2);
- _STORE16(x1, out + 4);
- _STORE16(x3, out + 6);
+ STORE16(x0, out + 0);
+ STORE16(x2, out + 2);
+ STORE16(x1, out + 4);
+ STORE16(x3, out + 6);
return CRYPT_OK;
}
@@ -146,12 +146,12 @@ int idea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_k
if (num_rounds != 0 && num_rounds != 8) return CRYPT_INVALID_ROUNDS;
if (keylen != 16) return CRYPT_INVALID_KEYSIZE;
- return _setup_key(key, skey);
+ return s_setup_key(key, skey);
}
int idea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _process_block(pt, ct, skey->idea.ek);
+ int err = s_process_block(pt, ct, skey->idea.ek);
#ifdef LTC_CLEAN_STACK
burn_stack(sizeof(ushort16) * 6 + sizeof(int));
#endif
@@ -160,7 +160,7 @@ int idea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric
int idea_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _process_block(ct, pt, skey->idea.dk);
+ int err = s_process_block(ct, pt, skey->idea.dk);
#ifdef LTC_CLEAN_STACK
burn_stack(sizeof(ushort16) * 6 + sizeof(int));
#endif
diff --git a/src/ltc/ciphers/multi2.c b/src/ltc/ciphers/multi2.c
index d824e71c..e1a84acf 100644
--- a/src/ltc/ciphers/multi2.c
+++ b/src/ltc/ciphers/multi2.c
@@ -9,12 +9,12 @@
#ifdef LTC_MULTI2
-static void pi1(ulong32 *p)
+static void s_pi1(ulong32 *p)
{
p[1] ^= p[0];
}
-static void pi2(ulong32 *p, const ulong32 *k)
+static void s_pi2(ulong32 *p, const ulong32 *k)
{
ulong32 t;
t = (p[1] + k[0]) & 0xFFFFFFFFUL;
@@ -23,7 +23,7 @@ static void pi2(ulong32 *p, const ulong32 *k)
p[0] ^= t;
}
-static void pi3(ulong32 *p, const ulong32 *k)
+static void s_pi3(ulong32 *p, const ulong32 *k)
{
ulong32 t;
t = p[0] + k[1];
@@ -35,7 +35,7 @@ static void pi3(ulong32 *p, const ulong32 *k)
p[1] ^= t;
}
-static void pi4(ulong32 *p, const ulong32 *k)
+static void s_pi4(ulong32 *p, const ulong32 *k)
{
ulong32 t;
t = (p[1] + k[3]) & 0xFFFFFFFFUL;
@@ -43,7 +43,7 @@ static void pi4(ulong32 *p, const ulong32 *k)
p[0] ^= t;
}
-static void setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk)
+static void s_setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk)
{
int n, t;
ulong32 p[2];
@@ -52,46 +52,46 @@ static void setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk)
t = 4;
n = 0;
- pi1(p);
- pi2(p, k);
+ s_pi1(p);
+ s_pi2(p, k);
uk[n++] = p[0];
- pi3(p, k);
+ s_pi3(p, k);
uk[n++] = p[1];
- pi4(p, k);
+ s_pi4(p, k);
uk[n++] = p[0];
- pi1(p);
+ s_pi1(p);
uk[n++] = p[1];
- pi2(p, k+t);
+ s_pi2(p, k+t);
uk[n++] = p[0];
- pi3(p, k+t);
+ s_pi3(p, k+t);
uk[n++] = p[1];
- pi4(p, k+t);
+ s_pi4(p, k+t);
uk[n++] = p[0];
- pi1(p);
+ s_pi1(p);
uk[n++] = p[1];
}
-static void encrypt(ulong32 *p, int N, const ulong32 *uk)
+static void s_encrypt(ulong32 *p, int N, const ulong32 *uk)
{
int n, t;
for (t = n = 0; ; ) {
- pi1(p); if (++n == N) break;
- pi2(p, uk+t); if (++n == N) break;
- pi3(p, uk+t); if (++n == N) break;
- pi4(p, uk+t); if (++n == N) break;
+ s_pi1(p); if (++n == N) break;
+ s_pi2(p, uk+t); if (++n == N) break;
+ s_pi3(p, uk+t); if (++n == N) break;
+ s_pi4(p, uk+t); if (++n == N) break;
t ^= 4;
}
}
-static void decrypt(ulong32 *p, int N, const ulong32 *uk)
+static void s_decrypt(ulong32 *p, int N, const ulong32 *uk)
{
int n, t;
for (t = 4*(((N-1)>>2)&1), n = N; ; ) {
switch (n<=4 ? n : ((n-1)%4)+1) {
- case 4: pi4(p, uk+t); --n; /* FALLTHROUGH */
- case 3: pi3(p, uk+t); --n; /* FALLTHROUGH */
- case 2: pi2(p, uk+t); --n; /* FALLTHROUGH */
- case 1: pi1(p); --n; break;
+ case 4: s_pi4(p, uk+t); --n; /* FALLTHROUGH */
+ case 3: s_pi3(p, uk+t); --n; /* FALLTHROUGH */
+ case 2: s_pi2(p, uk+t); --n; /* FALLTHROUGH */
+ case 1: s_pi1(p); --n; break;
case 0: return;
}
t ^= 4;
@@ -128,7 +128,7 @@ int multi2_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
}
LOAD32H(dk[0], key + 32);
LOAD32H(dk[1], key + 36);
- setup(dk, sk, skey->multi2.uk);
+ s_setup(dk, sk, skey->multi2.uk);
zeromem(sk, sizeof(sk));
zeromem(dk, sizeof(dk));
@@ -150,7 +150,7 @@ int multi2_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetr
LTC_ARGCHK(skey != NULL);
LOAD32H(p[0], pt);
LOAD32H(p[1], pt+4);
- encrypt(p, skey->multi2.N, skey->multi2.uk);
+ s_encrypt(p, skey->multi2.N, skey->multi2.uk);
STORE32H(p[0], ct);
STORE32H(p[1], ct+4);
return CRYPT_OK;
@@ -171,7 +171,7 @@ int multi2_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetr
LTC_ARGCHK(skey != NULL);
LOAD32H(p[0], ct);
LOAD32H(p[1], ct+4);
- decrypt(p, skey->multi2.N, skey->multi2.uk);
+ s_decrypt(p, skey->multi2.N, skey->multi2.uk);
STORE32H(p[0], pt);
STORE32H(p[1], pt+4);
return CRYPT_OK;
diff --git a/src/ltc/ciphers/noekeon.c b/src/ltc/ciphers/noekeon.c
index 229e33a6..58d73aec 100644
--- a/src/ltc/ciphers/noekeon.c
+++ b/src/ltc/ciphers/noekeon.c
@@ -102,7 +102,7 @@ int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -142,7 +142,7 @@ int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet
#ifdef LTC_CLEAN_STACK
int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _noekeon_ecb_encrypt(pt, ct, skey);
+ int err = s_noekeon_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(ulong32) * 5 + sizeof(int));
return err;
}
@@ -156,7 +156,7 @@ int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -195,7 +195,7 @@ int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmet
#ifdef LTC_CLEAN_STACK
int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _noekeon_ecb_decrypt(ct, pt, skey);
+ int err = s_noekeon_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(ulong32) * 5 + sizeof(int));
return err;
}
diff --git a/src/ltc/ciphers/rc2.c b/src/ltc/ciphers/rc2.c
index f4c68ec0..4832424b 100644
--- a/src/ltc/ciphers/rc2.c
+++ b/src/ltc/ciphers/rc2.c
@@ -139,7 +139,7 @@ int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rc2_ecb_encrypt( const unsigned char *pt,
+static int s_rc2_ecb_encrypt( const unsigned char *pt,
unsigned char *ct,
const symmetric_key *skey)
#else
@@ -200,7 +200,7 @@ int rc2_ecb_encrypt( const unsigned char *pt,
unsigned char *ct,
const symmetric_key *skey)
{
- int err = _rc2_ecb_encrypt(pt, ct, skey);
+ int err = s_rc2_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(unsigned *) + sizeof(unsigned) * 5);
return err;
}
@@ -217,7 +217,7 @@ int rc2_ecb_encrypt( const unsigned char *pt,
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rc2_ecb_decrypt( const unsigned char *ct,
+static int s_rc2_ecb_decrypt( const unsigned char *ct,
unsigned char *pt,
const symmetric_key *skey)
#else
@@ -279,7 +279,7 @@ int rc2_ecb_decrypt( const unsigned char *ct,
unsigned char *pt,
const symmetric_key *skey)
{
- int err = _rc2_ecb_decrypt(ct, pt, skey);
+ int err = s_rc2_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(unsigned *) + sizeof(unsigned) * 4 + sizeof(int));
return err;
}
diff --git a/src/ltc/ciphers/rc5.c b/src/ltc/ciphers/rc5.c
index b6d32475..f21ba4f4 100644
--- a/src/ltc/ciphers/rc5.c
+++ b/src/ltc/ciphers/rc5.c
@@ -43,7 +43,7 @@ static const ulong32 stab[50] = {
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
+static int s_rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#else
int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#endif
@@ -104,7 +104,7 @@ int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke
int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
{
int x;
- x = _rc5_setup(key, keylen, num_rounds, skey);
+ x = s_rc5_setup(key, keylen, num_rounds, skey);
burn_stack(sizeof(ulong32) * 122 + sizeof(int));
return x;
}
@@ -118,7 +118,7 @@ int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -164,7 +164,7 @@ int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_
#ifdef LTC_CLEAN_STACK
int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _rc5_ecb_encrypt(pt, ct, skey);
+ int err = s_rc5_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(ulong32) * 2 + sizeof(int));
return err;
}
@@ -178,7 +178,7 @@ int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -225,7 +225,7 @@ int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_
#ifdef LTC_CLEAN_STACK
int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _rc5_ecb_decrypt(ct, pt, skey);
+ int err = s_rc5_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(ulong32) * 2 + sizeof(int));
return err;
}
diff --git a/src/ltc/ciphers/rc6.c b/src/ltc/ciphers/rc6.c
index 02e1e983..d1341d31 100644
--- a/src/ltc/ciphers/rc6.c
+++ b/src/ltc/ciphers/rc6.c
@@ -40,7 +40,7 @@ static const ulong32 stab[44] = {
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
+static int s_rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#else
int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#endif
@@ -99,7 +99,7 @@ int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke
int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
{
int x;
- x = _rc6_setup(key, keylen, num_rounds, skey);
+ x = s_rc6_setup(key, keylen, num_rounds, skey);
burn_stack(sizeof(ulong32) * 122);
return x;
}
@@ -112,7 +112,7 @@ int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke
@param skey The key as scheduled
*/
#ifdef LTC_CLEAN_STACK
-static int _rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -154,7 +154,7 @@ int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_
#ifdef LTC_CLEAN_STACK
int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _rc6_ecb_encrypt(pt, ct, skey);
+ int err = s_rc6_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(ulong32) * 6 + sizeof(int));
return err;
}
@@ -167,7 +167,7 @@ int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_
@param skey The key as scheduled
*/
#ifdef LTC_CLEAN_STACK
-static int _rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -211,7 +211,7 @@ int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_
#ifdef LTC_CLEAN_STACK
int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _rc6_ecb_decrypt(ct, pt, skey);
+ int err = s_rc6_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(ulong32) * 6 + sizeof(int));
return err;
}
diff --git a/src/ltc/ciphers/safer/safer.c b/src/ltc/ciphers/safer/safer.c
index 4c798464..84cc2d01 100644
--- a/src/ltc/ciphers/safer/safer.c
+++ b/src/ltc/ciphers/safer/safer.c
@@ -24,7 +24,7 @@
#ifdef LTC_SAFER
-#define __LTC_SAFER_TAB_C__
+#define LTC_SAFER_TAB_C
#include "safer_tab.c"
const struct ltc_cipher_descriptor safer_k64_desc = {
@@ -91,13 +91,13 @@ const struct ltc_cipher_descriptor safer_k64_desc = {
/******************* Types ****************************************************/
#ifdef LTC_CLEAN_STACK
-static void _Safer_Expand_Userkey(const unsigned char *userkey_1,
+static void s_safer_expand_userkey(const unsigned char *userkey_1,
const unsigned char *userkey_2,
unsigned int nof_rounds,
int strengthened,
safer_key_t key)
#else
-static void Safer_Expand_Userkey(const unsigned char *userkey_1,
+static void safer_expand_userkey(const unsigned char *userkey_1,
const unsigned char *userkey_2,
unsigned int nof_rounds,
int strengthened,
@@ -160,13 +160,13 @@ static void Safer_Expand_Userkey(const unsigned char *userkey_1,
}
#ifdef LTC_CLEAN_STACK
-static void Safer_Expand_Userkey(const unsigned char *userkey_1,
+static void safer_expand_userkey(const unsigned char *userkey_1,
const unsigned char *userkey_2,
unsigned int nof_rounds,
int strengthened,
safer_key_t key)
{
- _Safer_Expand_Userkey(userkey_1, userkey_2, nof_rounds, strengthened, key);
+ s_safer_expand_userkey(userkey_1, userkey_2, nof_rounds, strengthened, key);
burn_stack(sizeof(unsigned char) * (2 * (LTC_SAFER_BLOCK_LEN + 1)) + sizeof(unsigned int)*2);
}
#endif
@@ -184,7 +184,7 @@ int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmet
return CRYPT_INVALID_KEYSIZE;
}
- Safer_Expand_Userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
+ safer_expand_userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
return CRYPT_OK;
}
@@ -201,7 +201,7 @@ int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symme
return CRYPT_INVALID_KEYSIZE;
}
- Safer_Expand_Userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
+ safer_expand_userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
return CRYPT_OK;
}
@@ -218,7 +218,7 @@ int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symme
return CRYPT_INVALID_KEYSIZE;
}
- Safer_Expand_Userkey(key, key+8, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
+ safer_expand_userkey(key, key+8, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
return CRYPT_OK;
}
@@ -235,12 +235,12 @@ int safer_sk128_setup(const unsigned char *key, int keylen, int num_rounds, symm
return CRYPT_INVALID_KEYSIZE;
}
- Safer_Expand_Userkey(key, key+8, (unsigned int)(num_rounds != 0?num_rounds:LTC_SAFER_SK128_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
+ safer_expand_userkey(key, key+8, (unsigned int)(num_rounds != 0?num_rounds:LTC_SAFER_SK128_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
return CRYPT_OK;
}
#ifdef LTC_CLEAN_STACK
-static int _safer_ecb_encrypt(const unsigned char *pt,
+static int s_safer_ecb_encrypt(const unsigned char *pt,
unsigned char *ct,
const symmetric_key *skey)
#else
@@ -287,14 +287,14 @@ int safer_ecb_encrypt(const unsigned char *pt,
unsigned char *ct,
const symmetric_key *skey)
{
- int err = _safer_ecb_encrypt(pt, ct, skey);
+ int err = s_safer_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(unsigned char) * 9 + sizeof(unsigned int) + sizeof(unsigned char *));
return err;
}
#endif
#ifdef LTC_CLEAN_STACK
-static int _safer_ecb_decrypt(const unsigned char *ct,
+static int s_safer_ecb_decrypt(const unsigned char *ct,
unsigned char *pt,
const symmetric_key *skey)
#else
@@ -342,7 +342,7 @@ int safer_ecb_decrypt(const unsigned char *ct,
unsigned char *pt,
const symmetric_key *skey)
{
- int err = _safer_ecb_decrypt(ct, pt, skey);
+ int err = s_safer_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(unsigned char) * 9 + sizeof(unsigned int) + sizeof(unsigned char *));
return err;
}
diff --git a/src/ltc/ciphers/safer/safer_tab.c b/src/ltc/ciphers/safer/safer_tab.c
index b93f3f24..4cc0e476 100644
--- a/src/ltc/ciphers/safer/safer_tab.c
+++ b/src/ltc/ciphers/safer/safer_tab.c
@@ -6,7 +6,7 @@
Tables for LTC_SAFER block ciphers
*/
-#ifdef __LTC_SAFER_TAB_C__
+#ifdef LTC_SAFER_TAB_C
/* This is the box defined by ebox[x] = 45^x mod 257.
* Its assumed that the value "256" corresponds to zero. */
@@ -49,6 +49,6 @@ static const unsigned char safer_lbox[256] = {
184, 64, 120, 45, 58, 233, 100, 31, 146, 144, 125, 57, 111, 224, 137, 48
};
-#endif /* __LTC_SAFER_TAB_C__ */
+#endif /* LTC_SAFER_TAB_C */
diff --git a/src/ltc/ciphers/safer/saferp.c b/src/ltc/ciphers/safer/saferp.c
index 6ee2719c..86cc7089 100644
--- a/src/ltc/ciphers/safer/saferp.c
+++ b/src/ltc/ciphers/safer/saferp.c
@@ -9,7 +9,7 @@
#ifdef LTC_SAFERP
-#define __LTC_SAFER_TAB_C__
+#define LTC_SAFER_TAB_C
#include "safer_tab.c"
const struct ltc_cipher_descriptor saferp_desc =
@@ -137,37 +137,37 @@ const struct ltc_cipher_descriptor saferp_desc =
#ifdef LTC_SMALL_CODE
-static void _round(unsigned char *b, int i, const symmetric_key *skey)
+static void s_round(unsigned char *b, int i, const symmetric_key *skey)
{
ROUND(b, i);
}
-static void _iround(unsigned char *b, int i, const symmetric_key *skey)
+static void s_iround(unsigned char *b, int i, const symmetric_key *skey)
{
iROUND(b, i);
}
-static void _lt(unsigned char *b, unsigned char *b2)
+static void s_lt(unsigned char *b, unsigned char *b2)
{
LT(b, b2);
}
-static void _ilt(unsigned char *b, unsigned char *b2)
+static void s_ilt(unsigned char *b, unsigned char *b2)
{
iLT(b, b2);
}
#undef ROUND
-#define ROUND(b, i) _round(b, i, skey)
+#define ROUND(b, i) s_round(b, i, skey)
#undef iROUND
-#define iROUND(b, i) _iround(b, i, skey)
+#define iROUND(b, i) s_iround(b, i, skey)
#undef LT
-#define LT(b, b2) _lt(b, b2)
+#define LT(b, b2) s_lt(b, b2)
#undef iLT
-#define iLT(b, b2) _ilt(b, b2)
+#define iLT(b, b2) s_ilt(b, b2)
#endif
diff --git a/src/ltc/ciphers/serpent.c b/src/ltc/ciphers/serpent.c
index f40e8382..dbb999eb 100644
--- a/src/ltc/ciphers/serpent.c
+++ b/src/ltc/ciphers/serpent.c
@@ -27,7 +27,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
};
/* linear transformation */
-#define _LT(i,a,b,c,d,e) { \
+#define s_lt(i,a,b,c,d,e) { \
a = ROLc(a, 13); \
c = ROLc(c, 3); \
d = ROLc(d ^ c ^ (a << 3), 7); \
@@ -37,7 +37,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
}
/* inverse linear transformation */
-#define _ILT(i,a,b,c,d,e) { \
+#define s_ilt(i,a,b,c,d,e) { \
c = RORc(c, 22); \
a = RORc(a, 5); \
c ^= d ^ (b << 7); \
@@ -50,32 +50,32 @@ const struct ltc_cipher_descriptor serpent_desc = {
}
/* order of output from S-box functions */
-#define _beforeS0(f) f(0,a,b,c,d,e)
-#define _afterS0(f) f(1,b,e,c,a,d)
-#define _afterS1(f) f(2,c,b,a,e,d)
-#define _afterS2(f) f(3,a,e,b,d,c)
-#define _afterS3(f) f(4,e,b,d,c,a)
-#define _afterS4(f) f(5,b,a,e,c,d)
-#define _afterS5(f) f(6,a,c,b,e,d)
-#define _afterS6(f) f(7,a,c,d,b,e)
-#define _afterS7(f) f(8,d,e,b,a,c)
+#define s_beforeS0(f) f(0,a,b,c,d,e)
+#define s_afterS0(f) f(1,b,e,c,a,d)
+#define s_afterS1(f) f(2,c,b,a,e,d)
+#define s_afterS2(f) f(3,a,e,b,d,c)
+#define s_afterS3(f) f(4,e,b,d,c,a)
+#define s_afterS4(f) f(5,b,a,e,c,d)
+#define s_afterS5(f) f(6,a,c,b,e,d)
+#define s_afterS6(f) f(7,a,c,d,b,e)
+#define s_afterS7(f) f(8,d,e,b,a,c)
/* order of output from inverse S-box functions */
-#define _beforeI7(f) f(8,a,b,c,d,e)
-#define _afterI7(f) f(7,d,a,b,e,c)
-#define _afterI6(f) f(6,a,b,c,e,d)
-#define _afterI5(f) f(5,b,d,e,c,a)
-#define _afterI4(f) f(4,b,c,e,a,d)
-#define _afterI3(f) f(3,a,b,e,c,d)
-#define _afterI2(f) f(2,b,d,e,c,a)
-#define _afterI1(f) f(1,a,b,c,e,d)
-#define _afterI0(f) f(0,a,d,b,e,c)
+#define s_beforeI7(f) f(8,a,b,c,d,e)
+#define s_afterI7(f) f(7,d,a,b,e,c)
+#define s_afterI6(f) f(6,a,b,c,e,d)
+#define s_afterI5(f) f(5,b,d,e,c,a)
+#define s_afterI4(f) f(4,b,c,e,a,d)
+#define s_afterI3(f) f(3,a,b,e,c,d)
+#define s_afterI2(f) f(2,b,d,e,c,a)
+#define s_afterI1(f) f(1,a,b,c,e,d)
+#define s_afterI0(f) f(0,a,d,b,e,c)
/* The instruction sequences for the S-box functions
* come from Dag Arne Osvik's paper "Speeding up Serpent".
*/
-#define _S0(i, r0, r1, r2, r3, r4) { \
+#define s_s0(i, r0, r1, r2, r3, r4) { \
r3 ^= r0; \
r4 = r1; \
r1 &= r3; \
@@ -96,7 +96,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r4 ^= r3; \
}
-#define _I0(i, r0, r1, r2, r3, r4) { \
+#define s_i0(i, r0, r1, r2, r3, r4) { \
r2 = ~r2; \
r4 = r1; \
r1 |= r0; \
@@ -118,7 +118,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r4 ^= r2; \
}
-#define _S1(i, r0, r1, r2, r3, r4) { \
+#define s_s1(i, r0, r1, r2, r3, r4) { \
r0 = ~r0; \
r2 = ~r2; \
r4 = r0; \
@@ -139,7 +139,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r0 ^= r4; \
}
-#define _I1(i, r0, r1, r2, r3, r4) { \
+#define s_i1(i, r0, r1, r2, r3, r4) { \
r4 = r1; \
r1 ^= r3; \
r3 &= r1; \
@@ -161,7 +161,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r3 ^= r1; \
}
-#define _S2(i, r0, r1, r2, r3, r4) { \
+#define s_s2(i, r0, r1, r2, r3, r4) { \
r4 = r0; \
r0 &= r2; \
r0 ^= r3; \
@@ -180,7 +180,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r4 = ~r4; \
}
-#define _I2(i, r0, r1, r2, r3, r4) { \
+#define s_i2(i, r0, r1, r2, r3, r4) { \
r2 ^= r3; \
r3 ^= r0; \
r4 = r3; \
@@ -202,7 +202,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r3 ^= r0; \
}
-#define _S3(i, r0, r1, r2, r3, r4) { \
+#define s_s3(i, r0, r1, r2, r3, r4) { \
r4 = r0; \
r0 |= r3; \
r3 ^= r1; \
@@ -224,7 +224,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r1 ^= r0; \
}
-#define _I3(i, r0, r1, r2, r3, r4) { \
+#define s_i3(i, r0, r1, r2, r3, r4) { \
r4 = r2; \
r2 ^= r1; \
r1 &= r2; \
@@ -245,7 +245,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r2 ^= r4; \
}
-#define _S4(i, r0, r1, r2, r3, r4) { \
+#define s_s4(i, r0, r1, r2, r3, r4) { \
r1 ^= r3; \
r3 = ~r3; \
r2 ^= r3; \
@@ -268,7 +268,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r4 ^= r2; \
}
-#define _I4(i, r0, r1, r2, r3, r4) { \
+#define s_i4(i, r0, r1, r2, r3, r4) { \
r4 = r2; \
r2 &= r3; \
r2 ^= r1; \
@@ -291,7 +291,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r2 ^= r1; \
}
-#define _S5(i, r0, r1, r2, r3, r4) { \
+#define s_s5(i, r0, r1, r2, r3, r4) { \
r0 ^= r1; \
r1 ^= r3; \
r3 = ~r3; \
@@ -313,7 +313,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r2 ^= r4; \
}
-#define _I5(i, r0, r1, r2, r3, r4) { \
+#define s_i5(i, r0, r1, r2, r3, r4) { \
r1 = ~r1; \
r4 = r3; \
r2 ^= r1; \
@@ -335,7 +335,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r4 = ~r4; \
}
-#define _S6(i, r0, r1, r2, r3, r4) { \
+#define s_s6(i, r0, r1, r2, r3, r4) { \
r2 = ~r2; \
r4 = r3; \
r3 &= r0; \
@@ -356,7 +356,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r2 ^= r3; \
}
-#define _I6(i, r0, r1, r2, r3, r4) { \
+#define s_i6(i, r0, r1, r2, r3, r4) { \
r0 ^= r2; \
r4 = r2; \
r2 &= r0; \
@@ -376,7 +376,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r4 ^= r0; \
}
-#define _S7(i, r0, r1, r2, r3, r4) { \
+#define s_s7(i, r0, r1, r2, r3, r4) { \
r4 = r2; \
r2 &= r1; \
r2 ^= r3; \
@@ -399,7 +399,7 @@ const struct ltc_cipher_descriptor serpent_desc = {
r4 ^= r1; \
}
-#define _I7(i, r0, r1, r2, r3, r4) { \
+#define s_i7(i, r0, r1, r2, r3, r4) { \
r4 = r2; \
r2 ^= r0; \
r0 &= r3; \
@@ -422,28 +422,28 @@ const struct ltc_cipher_descriptor serpent_desc = {
}
/* key xor */
-#define _KX(r, a, b, c, d, e) { \
+#define s_kx(r, a, b, c, d, e) { \
a ^= k[4 * r + 0]; \
b ^= k[4 * r + 1]; \
c ^= k[4 * r + 2]; \
d ^= k[4 * r + 3]; \
}
-#define _LK(r, a, b, c, d, e) { \
+#define s_lk(r, a, b, c, d, e) { \
a = k[(8-r)*4 + 0]; \
b = k[(8-r)*4 + 1]; \
c = k[(8-r)*4 + 2]; \
d = k[(8-r)*4 + 3]; \
}
-#define _SK(r, a, b, c, d, e) { \
+#define s_sk(r, a, b, c, d, e) { \
k[(8-r)*4 + 4] = a; \
k[(8-r)*4 + 5] = b; \
k[(8-r)*4 + 6] = c; \
k[(8-r)*4 + 7] = d; \
}
-static int _setup_key(const unsigned char *key, int keylen, int rounds, ulong32 *k)
+static int s_setup_key(const unsigned char *key, int keylen, int rounds, ulong32 *k)
{
int i;
ulong32 t;
@@ -467,22 +467,22 @@ static int _setup_key(const unsigned char *key, int keylen, int rounds, ulong32
k -= 20;
for (i = 0; i < rounds/8; i++) {
- _afterS2(_LK); _afterS2(_S3); _afterS3(_SK);
- _afterS1(_LK); _afterS1(_S2); _afterS2(_SK);
- _afterS0(_LK); _afterS0(_S1); _afterS1(_SK);
- _beforeS0(_LK); _beforeS0(_S0); _afterS0(_SK);
+ s_afterS2(s_lk); s_afterS2(s_s3); s_afterS3(s_sk);
+ s_afterS1(s_lk); s_afterS1(s_s2); s_afterS2(s_sk);
+ s_afterS0(s_lk); s_afterS0(s_s1); s_afterS1(s_sk);
+ s_beforeS0(s_lk); s_beforeS0(s_s0); s_afterS0(s_sk);
k += 8*4;
- _afterS6(_LK); _afterS6(_S7); _afterS7(_SK);
- _afterS5(_LK); _afterS5(_S6); _afterS6(_SK);
- _afterS4(_LK); _afterS4(_S5); _afterS5(_SK);
- _afterS3(_LK); _afterS3(_S4); _afterS4(_SK);
+ s_afterS6(s_lk); s_afterS6(s_s7); s_afterS7(s_sk);
+ s_afterS5(s_lk); s_afterS5(s_s6); s_afterS6(s_sk);
+ s_afterS4(s_lk); s_afterS4(s_s5); s_afterS5(s_sk);
+ s_afterS3(s_lk); s_afterS3(s_s4); s_afterS4(s_sk);
}
- _afterS2(_LK); _afterS2(_S3); _afterS3(_SK);
+ s_afterS2(s_lk); s_afterS2(s_s3); s_afterS3(s_sk);
return CRYPT_OK;
}
-static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32 *k)
+static int s_enc_block(const unsigned char *in, unsigned char *out, const ulong32 *k)
{
ulong32 a, b, c, d, e;
unsigned int i = 1;
@@ -493,14 +493,14 @@ static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32
LOAD32L(d, in + 12);
do {
- _beforeS0(_KX); _beforeS0(_S0); _afterS0(_LT);
- _afterS0(_KX); _afterS0(_S1); _afterS1(_LT);
- _afterS1(_KX); _afterS1(_S2); _afterS2(_LT);
- _afterS2(_KX); _afterS2(_S3); _afterS3(_LT);
- _afterS3(_KX); _afterS3(_S4); _afterS4(_LT);
- _afterS4(_KX); _afterS4(_S5); _afterS5(_LT);
- _afterS5(_KX); _afterS5(_S6); _afterS6(_LT);
- _afterS6(_KX); _afterS6(_S7);
+ s_beforeS0(s_kx); s_beforeS0(s_s0); s_afterS0(s_lt);
+ s_afterS0(s_kx); s_afterS0(s_s1); s_afterS1(s_lt);
+ s_afterS1(s_kx); s_afterS1(s_s2); s_afterS2(s_lt);
+ s_afterS2(s_kx); s_afterS2(s_s3); s_afterS3(s_lt);
+ s_afterS3(s_kx); s_afterS3(s_s4); s_afterS4(s_lt);
+ s_afterS4(s_kx); s_afterS4(s_s5); s_afterS5(s_lt);
+ s_afterS5(s_kx); s_afterS5(s_s6); s_afterS6(s_lt);
+ s_afterS6(s_kx); s_afterS6(s_s7);
if (i == 4) break;
@@ -511,10 +511,10 @@ static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32
d = a;
a = e;
k += 32;
- _beforeS0(_LT);
+ s_beforeS0(s_lt);
} while (1);
- _afterS7(_KX);
+ s_afterS7(s_kx);
STORE32L(d, out + 0);
STORE32L(e, out + 4);
@@ -524,7 +524,7 @@ static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32
return CRYPT_OK;
}
-static int _dec_block(const unsigned char *in, unsigned char *out, const ulong32 *k)
+static int s_dec_block(const unsigned char *in, unsigned char *out, const ulong32 *k)
{
ulong32 a, b, c, d, e;
unsigned int i;
@@ -537,7 +537,7 @@ static int _dec_block(const unsigned char *in, unsigned char *out, const ulong32
i = 4;
k += 96;
- _beforeI7(_KX);
+ s_beforeI7(s_kx);
goto start;
do {
@@ -545,16 +545,16 @@ static int _dec_block(const unsigned char *in, unsigned char *out, const ulong32
b = d;
d = e;
k -= 32;
- _beforeI7(_ILT);
+ s_beforeI7(s_ilt);
start:
- _beforeI7(_I7); _afterI7(_KX);
- _afterI7(_ILT); _afterI7(_I6); _afterI6(_KX);
- _afterI6(_ILT); _afterI6(_I5); _afterI5(_KX);
- _afterI5(_ILT); _afterI5(_I4); _afterI4(_KX);
- _afterI4(_ILT); _afterI4(_I3); _afterI3(_KX);
- _afterI3(_ILT); _afterI3(_I2); _afterI2(_KX);
- _afterI2(_ILT); _afterI2(_I1); _afterI1(_KX);
- _afterI1(_ILT); _afterI1(_I0); _afterI0(_KX);
+ s_beforeI7(s_i7); s_afterI7(s_kx);
+ s_afterI7(s_ilt); s_afterI7(s_i6); s_afterI6(s_kx);
+ s_afterI6(s_ilt); s_afterI6(s_i5); s_afterI5(s_kx);
+ s_afterI5(s_ilt); s_afterI5(s_i4); s_afterI4(s_kx);
+ s_afterI4(s_ilt); s_afterI4(s_i3); s_afterI3(s_kx);
+ s_afterI3(s_ilt); s_afterI3(s_i2); s_afterI2(s_kx);
+ s_afterI2(s_ilt); s_afterI2(s_i1); s_afterI1(s_kx);
+ s_afterI1(s_ilt); s_afterI1(s_i0); s_afterI0(s_kx);
} while (--i != 0);
STORE32L(a, out + 0);
@@ -575,7 +575,7 @@ int serpent_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
if (num_rounds != 0 && num_rounds != 32) return CRYPT_INVALID_ROUNDS;
if (keylen != 16 && keylen != 24 && keylen != 32) return CRYPT_INVALID_KEYSIZE;
- err = _setup_key(key, keylen, 32, skey->serpent.k);
+ err = s_setup_key(key, keylen, 32, skey->serpent.k);
#ifdef LTC_CLEAN_STACK
burn_stack(sizeof(ulong32) * 14 + sizeof(int));
#endif
@@ -584,7 +584,7 @@ int serpent_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
int serpent_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _enc_block(pt, ct, skey->serpent.k);
+ int err = s_enc_block(pt, ct, skey->serpent.k);
#ifdef LTC_CLEAN_STACK
burn_stack(sizeof(ulong32) * 5 + sizeof(int));
#endif
@@ -593,7 +593,7 @@ int serpent_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet
int serpent_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _dec_block(ct, pt, skey->serpent.k);
+ int err = s_dec_block(ct, pt, skey->serpent.k);
#ifdef LTC_CLEAN_STACK
burn_stack(sizeof(ulong32) * 5 + sizeof(int));
#endif
diff --git a/src/ltc/ciphers/skipjack.c b/src/ltc/ciphers/skipjack.c
index 2ab49f84..0251946a 100644
--- a/src/ltc/ciphers/skipjack.c
+++ b/src/ltc/ciphers/skipjack.c
@@ -133,7 +133,7 @@ static unsigned ig_func(unsigned w, int *kp, const unsigned char *key)
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -183,7 +183,7 @@ int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme
#ifdef LTC_CLEAN_STACK
int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _skipjack_ecb_encrypt(pt, ct, skey);
+ int err = s_skipjack_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(unsigned) * 8 + sizeof(int) * 2);
return err;
}
@@ -197,7 +197,7 @@ int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -251,7 +251,7 @@ int skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symme
#ifdef LTC_CLEAN_STACK
int skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err = _skipjack_ecb_decrypt(ct, pt, skey);
+ int err = s_skipjack_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(unsigned) * 7 + sizeof(int) * 2);
return err;
}
diff --git a/src/ltc/ciphers/twofish/twofish.c b/src/ltc/ciphers/twofish/twofish.c
index 127d138b..c006361b 100644
--- a/src/ltc/ciphers/twofish/twofish.c
+++ b/src/ltc/ciphers/twofish/twofish.c
@@ -58,7 +58,7 @@ static const unsigned char qord[4][5] = {
#ifdef LTC_TWOFISH_TABLES
-#define __LTC_TWOFISH_TAB_C__
+#define LTC_TWOFISH_TAB_C
#include "twofish_tab.c"
#define sbox(i, x) ((ulong32)SBOX[i][(x)&255])
@@ -83,7 +83,7 @@ static const unsigned char qbox[2][4][16] = {
/* computes S_i[x] */
#ifdef LTC_CLEAN_STACK
-static ulong32 _sbox(int i, ulong32 x)
+static ulong32 s_sbox(int i, ulong32 x)
#else
static ulong32 sbox(int i, ulong32 x)
#endif
@@ -125,7 +125,7 @@ static ulong32 sbox(int i, ulong32 x)
static ulong32 sbox(int i, ulong32 x)
{
ulong32 y;
- y = _sbox(i, x);
+ y = s_sbox(i, x);
burn_stack(sizeof(unsigned char) * 11);
return y;
}
@@ -282,7 +282,7 @@ static void h_func(const unsigned char *in, unsigned char *out, const unsigned c
#else
#ifdef LTC_CLEAN_STACK
-static ulong32 _g_func(ulong32 x, const symmetric_key *key)
+static ulong32 s_g_func(ulong32 x, const symmetric_key *key)
#else
static ulong32 g_func(ulong32 x, const symmetric_key *key)
#endif
@@ -318,7 +318,7 @@ static ulong32 g_func(ulong32 x, const symmetric_key *key)
static ulong32 g_func(ulong32 x, const symmetric_key *key)
{
ulong32 y;
- y = _g_func(x, key);
+ y = s_g_func(x, key);
burn_stack(sizeof(unsigned char) * 4 + sizeof(ulong32));
return y;
}
@@ -335,7 +335,7 @@ static ulong32 g_func(ulong32 x, const symmetric_key *key)
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
+static int s_twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#else
int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
#endif
@@ -448,7 +448,7 @@ int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
{
int x;
- x = _twofish_setup(key, keylen, num_rounds, skey);
+ x = s_twofish_setup(key, keylen, num_rounds, skey);
burn_stack(sizeof(int) * 7 + sizeof(unsigned char) * 56 + sizeof(ulong32) * 2);
return x;
}
@@ -462,7 +462,7 @@ int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetri
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
+static int s_twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#else
int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
#endif
@@ -522,7 +522,7 @@ int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet
#ifdef LTC_CLEAN_STACK
int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey)
{
- int err = _twofish_ecb_encrypt(pt, ct, skey);
+ int err = s_twofish_ecb_encrypt(pt, ct, skey);
burn_stack(sizeof(ulong32) * 10 + sizeof(int));
return err;
}
@@ -536,7 +536,7 @@ int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet
@return CRYPT_OK if successful
*/
#ifdef LTC_CLEAN_STACK
-static int _twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
+static int s_twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#else
int twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
#endif
@@ -598,7 +598,7 @@ int twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmet
#ifdef LTC_CLEAN_STACK
int twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey)
{
- int err =_twofish_ecb_decrypt(ct, pt, skey);
+ int err = s_twofish_ecb_decrypt(ct, pt, skey);
burn_stack(sizeof(ulong32) * 10 + sizeof(int));
return err;
}
diff --git a/src/ltc/ciphers/twofish/twofish_tab.c b/src/ltc/ciphers/twofish/twofish_tab.c
index d6cc874c..e52d2847 100644
--- a/src/ltc/ciphers/twofish/twofish_tab.c
+++ b/src/ltc/ciphers/twofish/twofish_tab.c
@@ -6,7 +6,7 @@
Twofish tables, Tom St Denis
*/
#ifdef LTC_TWOFISH_TABLES
-#ifdef __LTC_TWOFISH_TAB_C__
+#ifdef LTC_TWOFISH_TAB_C
/* pre generated 8x8 tables from the four 4x4s */
static const unsigned char SBOX[2][256] = {
@@ -482,5 +482,5 @@ static const ulong32 rs_tab7[256] = {
#endif /* LTC_TWOFISH_ALL_TABLES */
-#endif /* __LTC_TWOFISH_TAB_C__ */
+#endif /* LTC_TWOFISH_TAB_C */
#endif