diff options
author | Karel Miko <karel.miko@gmail.com> | 2020-12-01 12:28:50 +0100 |
---|---|---|
committer | Karel Miko <karel.miko@gmail.com> | 2020-12-01 12:28:50 +0100 |
commit | 1644699159cf0fe410407393a9a7407102e4a60d (patch) | |
tree | 9b221274519220a89c0caadab01922c812e0f419 /src/ltc/ciphers | |
parent | f194f27a0f15c0ea0f978ef12d3cbb8c81bcbc73 (diff) |
libtomcrypt upgrade
Diffstat (limited to 'src/ltc/ciphers')
-rw-r--r-- | src/ltc/ciphers/aes/aes.c | 10 | ||||
-rw-r--r-- | src/ltc/ciphers/aes/aes_tab.c | 4 | ||||
-rw-r--r-- | src/ltc/ciphers/anubis.c | 4 | ||||
-rw-r--r-- | src/ltc/ciphers/blowfish.c | 8 | ||||
-rw-r--r-- | src/ltc/ciphers/cast5.c | 24 | ||||
-rw-r--r-- | src/ltc/ciphers/des.c | 12 | ||||
-rw-r--r-- | src/ltc/ciphers/idea.c | 90 | ||||
-rw-r--r-- | src/ltc/ciphers/multi2.c | 54 | ||||
-rw-r--r-- | src/ltc/ciphers/noekeon.c | 8 | ||||
-rw-r--r-- | src/ltc/ciphers/rc2.c | 8 | ||||
-rw-r--r-- | src/ltc/ciphers/rc5.c | 12 | ||||
-rw-r--r-- | src/ltc/ciphers/rc6.c | 12 | ||||
-rw-r--r-- | src/ltc/ciphers/safer/safer.c | 26 | ||||
-rw-r--r-- | src/ltc/ciphers/safer/safer_tab.c | 4 | ||||
-rw-r--r-- | src/ltc/ciphers/safer/saferp.c | 18 | ||||
-rw-r--r-- | src/ltc/ciphers/serpent.c | 148 | ||||
-rw-r--r-- | src/ltc/ciphers/skipjack.c | 8 | ||||
-rw-r--r-- | src/ltc/ciphers/twofish/twofish.c | 22 | ||||
-rw-r--r-- | src/ltc/ciphers/twofish/twofish_tab.c | 4 |
19 files changed, 235 insertions, 241 deletions
diff --git a/src/ltc/ciphers/aes/aes.c b/src/ltc/ciphers/aes/aes.c index 9e1bb399..dd6f14e8 100644 --- a/src/ltc/ciphers/aes/aes.c +++ b/src/ltc/ciphers/aes/aes.c @@ -80,7 +80,7 @@ const struct ltc_cipher_descriptor aes_enc_desc = #endif -#define __LTC_AES_TAB_C__ +#define LTC_AES_TAB_C #include "aes_tab.c" static ulong32 setup_mix(ulong32 temp) @@ -275,7 +275,7 @@ int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *s @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rijndael_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_rijndael_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -443,7 +443,7 @@ int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *ske #ifdef LTC_CLEAN_STACK int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _rijndael_ecb_encrypt(pt, ct, skey); + int err = s_rijndael_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(unsigned long)*8 + sizeof(unsigned long*) + sizeof(int)*2); return err; } @@ -459,7 +459,7 @@ int ECB_ENC(const unsigned char *pt, unsigned char *ct, const symmetric_key *ske @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rijndael_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_rijndael_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int ECB_DEC(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -628,7 +628,7 @@ int ECB_DEC(const unsigned char *ct, unsigned char *pt, const symmetric_key *ske #ifdef LTC_CLEAN_STACK int ECB_DEC(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _rijndael_ecb_decrypt(ct, pt, skey); + int err = s_rijndael_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(unsigned long)*8 + sizeof(unsigned long*) + sizeof(int)*2); return err; } diff --git a/src/ltc/ciphers/aes/aes_tab.c b/src/ltc/ciphers/aes/aes_tab.c index 4dfa1436..5e590041 100644 --- a/src/ltc/ciphers/aes/aes_tab.c +++ b/src/ltc/ciphers/aes/aes_tab.c @@ -15,7 +15,7 @@ Td3[x] = Si[x].[09, 0d, 0b, 0e]; Td4[x] = Si[x].[01, 01, 01, 01]; */ -#ifdef __LTC_AES_TAB_C__ +#ifdef LTC_AES_TAB_C /** @file aes_tab.c @@ -1019,4 +1019,4 @@ static const ulong32 rcon[] = { }; #endif -#endif /* __LTC_AES_TAB_C__ */ +#endif /* LTC_AES_TAB_C */ diff --git a/src/ltc/ciphers/anubis.c b/src/ltc/ciphers/anubis.c index 07cb5d3a..f6a1c58d 100644 --- a/src/ltc/ciphers/anubis.c +++ b/src/ltc/ciphers/anubis.c @@ -876,7 +876,7 @@ static const ulong32 rc[] = { @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) +static int s_anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #else int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #endif @@ -1013,7 +1013,7 @@ int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetri int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) { int err; - err = _anubis_setup(key, keylen, num_rounds, skey); + err = s_anubis_setup(key, keylen, num_rounds, skey); burn_stack(sizeof(int) * 5 + sizeof(ulong32) * (MAX_N + MAX_N + 5)); return err; } diff --git a/src/ltc/ciphers/blowfish.c b/src/ltc/ciphers/blowfish.c index a0eaf36a..35efc137 100644 --- a/src/ltc/ciphers/blowfish.c +++ b/src/ltc/ciphers/blowfish.c @@ -472,7 +472,7 @@ int blowfish_setup_with_data(const unsigned char *key, int keylen, @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -499,7 +499,7 @@ int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme #ifdef LTC_CLEAN_STACK int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _blowfish_ecb_encrypt(pt, ct, skey); + int err = s_blowfish_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(ulong32) * 2 + sizeof(int)); return err; } @@ -513,7 +513,7 @@ int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -560,7 +560,7 @@ int blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symme #ifdef LTC_CLEAN_STACK int blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _blowfish_ecb_decrypt(ct, pt, skey); + int err = s_blowfish_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(ulong32) * 2 + sizeof(int)); return err; } diff --git a/src/ltc/ciphers/cast5.c b/src/ltc/ciphers/cast5.c index 3672f3e2..3b401a5c 100644 --- a/src/ltc/ciphers/cast5.c +++ b/src/ltc/ciphers/cast5.c @@ -398,7 +398,7 @@ static const ulong32 S8[256] = { @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) +static int s_cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #else int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #endif @@ -485,19 +485,13 @@ int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) { int z; - z = _cast5_setup(key, keylen, num_rounds, skey); + z = s_cast5_setup(key, keylen, num_rounds, skey); burn_stack(sizeof(ulong32)*8 + 16 + sizeof(int)*2); return z; } #endif -#ifdef _MSC_VER - #define INLINE __inline -#else - #define INLINE -#endif - -INLINE static ulong32 FI(ulong32 R, ulong32 Km, ulong32 Kr) +LTC_INLINE static ulong32 FI(ulong32 R, ulong32 Km, ulong32 Kr) { ulong32 I; I = (Km + R); @@ -505,7 +499,7 @@ INLINE static ulong32 FI(ulong32 R, ulong32 Km, ulong32 Kr) return ((S1[LTC_BYTE(I, 3)] ^ S2[LTC_BYTE(I,2)]) - S3[LTC_BYTE(I,1)]) + S4[LTC_BYTE(I,0)]; } -INLINE static ulong32 FII(ulong32 R, ulong32 Km, ulong32 Kr) +LTC_INLINE static ulong32 FII(ulong32 R, ulong32 Km, ulong32 Kr) { ulong32 I; I = (Km ^ R); @@ -513,7 +507,7 @@ INLINE static ulong32 FII(ulong32 R, ulong32 Km, ulong32 Kr) return ((S1[LTC_BYTE(I, 3)] - S2[LTC_BYTE(I,2)]) + S3[LTC_BYTE(I,1)]) ^ S4[LTC_BYTE(I,0)]; } -INLINE static ulong32 FIII(ulong32 R, ulong32 Km, ulong32 Kr) +LTC_INLINE static ulong32 FIII(ulong32 R, ulong32 Km, ulong32 Kr) { ulong32 I; I = (Km - R); @@ -528,7 +522,7 @@ INLINE static ulong32 FIII(ulong32 R, ulong32 Km, ulong32 Kr) @param skey The key as scheduled */ #ifdef LTC_CLEAN_STACK -static int _cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -568,7 +562,7 @@ int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetri #ifdef LTC_CLEAN_STACK int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err =_cast5_ecb_encrypt(pt,ct,skey); + int err = s_cast5_ecb_encrypt(pt,ct,skey); burn_stack(sizeof(ulong32)*3); return err; } @@ -581,7 +575,7 @@ int cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetri @param skey The key as scheduled */ #ifdef LTC_CLEAN_STACK -static int _cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -621,7 +615,7 @@ int cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetri #ifdef LTC_CLEAN_STACK int cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _cast5_ecb_decrypt(ct,pt,skey); + int err = s_cast5_ecb_decrypt(ct,pt,skey); burn_stack(sizeof(ulong32)*3); return err; } diff --git a/src/ltc/ciphers/des.c b/src/ltc/ciphers/des.c index 5d77b5d6..5d00720c 100644 --- a/src/ltc/ciphers/des.c +++ b/src/ltc/ciphers/des.c @@ -1293,7 +1293,7 @@ static const ulong64 des_fp[8][256] = { static void cookey(const ulong32 *raw1, ulong32 *keyout); #ifdef LTC_CLEAN_STACK -static void _deskey(const unsigned char *key, short edf, ulong32 *keyout) +static void s_deskey(const unsigned char *key, short edf, ulong32 *keyout) #else static void deskey(const unsigned char *key, short edf, ulong32 *keyout) #endif @@ -1347,13 +1347,13 @@ static void deskey(const unsigned char *key, short edf, ulong32 *keyout) #ifdef LTC_CLEAN_STACK static void deskey(const unsigned char *key, short edf, ulong32 *keyout) { - _deskey(key, edf, keyout); + s_deskey(key, edf, keyout); burn_stack(sizeof(int)*5 + sizeof(ulong32)*32 + sizeof(unsigned char)*112); } #endif #ifdef LTC_CLEAN_STACK -static void _cookey(const ulong32 *raw1, ulong32 *keyout) +static void s_cookey(const ulong32 *raw1, ulong32 *keyout) #else static void cookey(const ulong32 *raw1, ulong32 *keyout) #endif @@ -1383,7 +1383,7 @@ static void cookey(const ulong32 *raw1, ulong32 *keyout) #ifdef LTC_CLEAN_STACK static void cookey(const ulong32 *raw1, ulong32 *keyout) { - _cookey(raw1, keyout); + s_cookey(raw1, keyout); burn_stack(sizeof(ulong32 *) * 2 + sizeof(ulong32)*32 + sizeof(int)); } #endif @@ -1391,7 +1391,7 @@ static void cookey(const ulong32 *raw1, ulong32 *keyout) #ifndef LTC_CLEAN_STACK static void desfunc(ulong32 *block, const ulong32 *keys) #else -static void _desfunc(ulong32 *block, const ulong32 *keys) +static void s_desfunc(ulong32 *block, const ulong32 *keys) #endif { ulong32 work, right, leftt; @@ -1505,7 +1505,7 @@ static void _desfunc(ulong32 *block, const ulong32 *keys) #ifdef LTC_CLEAN_STACK static void desfunc(ulong32 *block, const ulong32 *keys) { - _desfunc(block, keys); + s_desfunc(block, keys); burn_stack(sizeof(ulong32) * 4 + sizeof(int)); } #endif diff --git a/src/ltc/ciphers/idea.c b/src/ltc/ciphers/idea.c index 27db6167..b195a4c9 100644 --- a/src/ltc/ciphers/idea.c +++ b/src/ltc/ciphers/idea.c @@ -35,38 +35,38 @@ const struct ltc_cipher_descriptor idea_desc = { typedef unsigned short int ushort16; -#define _LOW16(x) ((x)&0xffff) /* compiler should be able to optimize this away if x is 16 bits */ -#define _HIGH16(x) ((x)>>16) -#define _MUL(a,b) { \ - ulong32 p = (ulong32)_LOW16(a) * b; \ +#define LOW16(x) ((x)&0xffff) /* compiler should be able to optimize this away if x is 16 bits */ +#define HIGH16(x) ((x)>>16) +#define MUL(a,b) { \ + ulong32 p = (ulong32)LOW16(a) * b; \ if (p) { \ - p = _LOW16(p) - _HIGH16(p); \ - a = (ushort16)p - (ushort16)_HIGH16(p); \ + p = LOW16(p) - HIGH16(p); \ + a = (ushort16)p - (ushort16)HIGH16(p); \ } \ else \ a = 1 - a - b; \ } -#define _STORE16(x,y) { (y)[0] = (unsigned char)(((x)>>8)&255); (y)[1] = (unsigned char)((x)&255); } -#define _LOAD16(x,y) { x = ((ushort16)((y)[0] & 255)<<8) | ((ushort16)((y)[1] & 255)); } +#define STORE16(x,y) { (y)[0] = (unsigned char)(((x)>>8)&255); (y)[1] = (unsigned char)((x)&255); } +#define LOAD16(x,y) { x = ((ushort16)((y)[0] & 255)<<8) | ((ushort16)((y)[1] & 255)); } -static ushort16 _mul_inv(ushort16 x) +static ushort16 s_mul_inv(ushort16 x) { ushort16 y = x; unsigned i; for (i = 0; i < 15; i++) { - _MUL(y, _LOW16(y)); - _MUL(y, x); + MUL(y, LOW16(y)); + MUL(y, x); } - return _LOW16(y); + return LOW16(y); } -static ushort16 _add_inv(ushort16 x) +static ushort16 s_add_inv(ushort16 x) { - return _LOW16(0 - x); + return LOW16(0 - x); } -static int _setup_key(const unsigned char *key, symmetric_key *skey) +static int s_setup_key(const unsigned char *key, symmetric_key *skey) { int i, j; ushort16 *e_key = skey->idea.ek; @@ -74,49 +74,49 @@ static int _setup_key(const unsigned char *key, symmetric_key *skey) /* prepare enc key */ for (i = 0; i < 8; i++) { - _LOAD16(e_key[i], key + 2 * i); + LOAD16(e_key[i], key + 2 * i); } for (; i < LTC_IDEA_KEYLEN; i++) { j = (i - i % 8) - 8; - e_key[i] = _LOW16((e_key[j+(i+1)%8] << 9) | (e_key[j+(i+2)%8] >> 7)); + e_key[i] = LOW16((e_key[j+(i+1)%8] << 9) | (e_key[j+(i+2)%8] >> 7)); } /* prepare dec key */ for (i = 0; i < LTC_IDEA_ROUNDS; i++) { - d_key[i*6+0] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]); - d_key[i*6+1] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1+(i>0 ? 1 : 0)]); - d_key[i*6+2] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2-(i>0 ? 1 : 0)]); - d_key[i*6+3] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]); - d_key[i*6+4] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+4]; - d_key[i*6+5] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+5]; + d_key[i*6+0] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]); + d_key[i*6+1] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1+(i>0 ? 1 : 0)]); + d_key[i*6+2] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2-(i>0 ? 1 : 0)]); + d_key[i*6+3] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]); + d_key[i*6+4] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+4]; + d_key[i*6+5] = e_key[(LTC_IDEA_ROUNDS-1-i)*6+5]; } - d_key[i*6+0] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]); - d_key[i*6+1] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1]); - d_key[i*6+2] = _add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2]); - d_key[i*6+3] = _mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]); + d_key[i*6+0] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+0]); + d_key[i*6+1] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+1]); + d_key[i*6+2] = s_add_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+2]); + d_key[i*6+3] = s_mul_inv(e_key[(LTC_IDEA_ROUNDS-i)*6+3]); return CRYPT_OK; } -static int _process_block(const unsigned char *in, unsigned char *out, const ushort16 *m_key) +static int s_process_block(const unsigned char *in, unsigned char *out, const ushort16 *m_key) { int i; ushort16 x0, x1, x2, x3, t0, t1; - _LOAD16(x0, in + 0); - _LOAD16(x1, in + 2); - _LOAD16(x2, in + 4); - _LOAD16(x3, in + 6); + LOAD16(x0, in + 0); + LOAD16(x1, in + 2); + LOAD16(x2, in + 4); + LOAD16(x3, in + 6); for (i = 0; i < LTC_IDEA_ROUNDS; i++) { - _MUL(x0, m_key[i*6+0]); + MUL(x0, m_key[i*6+0]); x1 += m_key[i*6+1]; x2 += m_key[i*6+2]; - _MUL(x3, m_key[i*6+3]); + MUL(x3, m_key[i*6+3]); t0 = x0^x2; - _MUL(t0, m_key[i*6+4]); + MUL(t0, m_key[i*6+4]); t1 = t0 + (x1^x3); - _MUL(t1, m_key[i*6+5]); + MUL(t1, m_key[i*6+5]); t0 += t1; x0 ^= t1; x3 ^= t0; @@ -125,15 +125,15 @@ static int _process_block(const unsigned char *in, unsigned char *out, const ush x2 = t0; } - _MUL(x0, m_key[LTC_IDEA_ROUNDS*6+0]); + MUL(x0, m_key[LTC_IDEA_ROUNDS*6+0]); x2 += m_key[LTC_IDEA_ROUNDS*6+1]; x1 += m_key[LTC_IDEA_ROUNDS*6+2]; - _MUL(x3, m_key[LTC_IDEA_ROUNDS*6+3]); + MUL(x3, m_key[LTC_IDEA_ROUNDS*6+3]); - _STORE16(x0, out + 0); - _STORE16(x2, out + 2); - _STORE16(x1, out + 4); - _STORE16(x3, out + 6); + STORE16(x0, out + 0); + STORE16(x2, out + 2); + STORE16(x1, out + 4); + STORE16(x3, out + 6); return CRYPT_OK; } @@ -146,12 +146,12 @@ int idea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_k if (num_rounds != 0 && num_rounds != 8) return CRYPT_INVALID_ROUNDS; if (keylen != 16) return CRYPT_INVALID_KEYSIZE; - return _setup_key(key, skey); + return s_setup_key(key, skey); } int idea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _process_block(pt, ct, skey->idea.ek); + int err = s_process_block(pt, ct, skey->idea.ek); #ifdef LTC_CLEAN_STACK burn_stack(sizeof(ushort16) * 6 + sizeof(int)); #endif @@ -160,7 +160,7 @@ int idea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric int idea_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _process_block(ct, pt, skey->idea.dk); + int err = s_process_block(ct, pt, skey->idea.dk); #ifdef LTC_CLEAN_STACK burn_stack(sizeof(ushort16) * 6 + sizeof(int)); #endif diff --git a/src/ltc/ciphers/multi2.c b/src/ltc/ciphers/multi2.c index d824e71c..e1a84acf 100644 --- a/src/ltc/ciphers/multi2.c +++ b/src/ltc/ciphers/multi2.c @@ -9,12 +9,12 @@ #ifdef LTC_MULTI2 -static void pi1(ulong32 *p) +static void s_pi1(ulong32 *p) { p[1] ^= p[0]; } -static void pi2(ulong32 *p, const ulong32 *k) +static void s_pi2(ulong32 *p, const ulong32 *k) { ulong32 t; t = (p[1] + k[0]) & 0xFFFFFFFFUL; @@ -23,7 +23,7 @@ static void pi2(ulong32 *p, const ulong32 *k) p[0] ^= t; } -static void pi3(ulong32 *p, const ulong32 *k) +static void s_pi3(ulong32 *p, const ulong32 *k) { ulong32 t; t = p[0] + k[1]; @@ -35,7 +35,7 @@ static void pi3(ulong32 *p, const ulong32 *k) p[1] ^= t; } -static void pi4(ulong32 *p, const ulong32 *k) +static void s_pi4(ulong32 *p, const ulong32 *k) { ulong32 t; t = (p[1] + k[3]) & 0xFFFFFFFFUL; @@ -43,7 +43,7 @@ static void pi4(ulong32 *p, const ulong32 *k) p[0] ^= t; } -static void setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk) +static void s_setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk) { int n, t; ulong32 p[2]; @@ -52,46 +52,46 @@ static void setup(const ulong32 *dk, const ulong32 *k, ulong32 *uk) t = 4; n = 0; - pi1(p); - pi2(p, k); + s_pi1(p); + s_pi2(p, k); uk[n++] = p[0]; - pi3(p, k); + s_pi3(p, k); uk[n++] = p[1]; - pi4(p, k); + s_pi4(p, k); uk[n++] = p[0]; - pi1(p); + s_pi1(p); uk[n++] = p[1]; - pi2(p, k+t); + s_pi2(p, k+t); uk[n++] = p[0]; - pi3(p, k+t); + s_pi3(p, k+t); uk[n++] = p[1]; - pi4(p, k+t); + s_pi4(p, k+t); uk[n++] = p[0]; - pi1(p); + s_pi1(p); uk[n++] = p[1]; } -static void encrypt(ulong32 *p, int N, const ulong32 *uk) +static void s_encrypt(ulong32 *p, int N, const ulong32 *uk) { int n, t; for (t = n = 0; ; ) { - pi1(p); if (++n == N) break; - pi2(p, uk+t); if (++n == N) break; - pi3(p, uk+t); if (++n == N) break; - pi4(p, uk+t); if (++n == N) break; + s_pi1(p); if (++n == N) break; + s_pi2(p, uk+t); if (++n == N) break; + s_pi3(p, uk+t); if (++n == N) break; + s_pi4(p, uk+t); if (++n == N) break; t ^= 4; } } -static void decrypt(ulong32 *p, int N, const ulong32 *uk) +static void s_decrypt(ulong32 *p, int N, const ulong32 *uk) { int n, t; for (t = 4*(((N-1)>>2)&1), n = N; ; ) { switch (n<=4 ? n : ((n-1)%4)+1) { - case 4: pi4(p, uk+t); --n; /* FALLTHROUGH */ - case 3: pi3(p, uk+t); --n; /* FALLTHROUGH */ - case 2: pi2(p, uk+t); --n; /* FALLTHROUGH */ - case 1: pi1(p); --n; break; + case 4: s_pi4(p, uk+t); --n; /* FALLTHROUGH */ + case 3: s_pi3(p, uk+t); --n; /* FALLTHROUGH */ + case 2: s_pi2(p, uk+t); --n; /* FALLTHROUGH */ + case 1: s_pi1(p); --n; break; case 0: return; } t ^= 4; @@ -128,7 +128,7 @@ int multi2_setup(const unsigned char *key, int keylen, int num_rounds, symmetri } LOAD32H(dk[0], key + 32); LOAD32H(dk[1], key + 36); - setup(dk, sk, skey->multi2.uk); + s_setup(dk, sk, skey->multi2.uk); zeromem(sk, sizeof(sk)); zeromem(dk, sizeof(dk)); @@ -150,7 +150,7 @@ int multi2_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetr LTC_ARGCHK(skey != NULL); LOAD32H(p[0], pt); LOAD32H(p[1], pt+4); - encrypt(p, skey->multi2.N, skey->multi2.uk); + s_encrypt(p, skey->multi2.N, skey->multi2.uk); STORE32H(p[0], ct); STORE32H(p[1], ct+4); return CRYPT_OK; @@ -171,7 +171,7 @@ int multi2_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetr LTC_ARGCHK(skey != NULL); LOAD32H(p[0], ct); LOAD32H(p[1], ct+4); - decrypt(p, skey->multi2.N, skey->multi2.uk); + s_decrypt(p, skey->multi2.N, skey->multi2.uk); STORE32H(p[0], pt); STORE32H(p[1], pt+4); return CRYPT_OK; diff --git a/src/ltc/ciphers/noekeon.c b/src/ltc/ciphers/noekeon.c index 229e33a6..58d73aec 100644 --- a/src/ltc/ciphers/noekeon.c +++ b/src/ltc/ciphers/noekeon.c @@ -102,7 +102,7 @@ int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetri @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -142,7 +142,7 @@ int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet #ifdef LTC_CLEAN_STACK int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _noekeon_ecb_encrypt(pt, ct, skey); + int err = s_noekeon_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(ulong32) * 5 + sizeof(int)); return err; } @@ -156,7 +156,7 @@ int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -195,7 +195,7 @@ int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmet #ifdef LTC_CLEAN_STACK int noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _noekeon_ecb_decrypt(ct, pt, skey); + int err = s_noekeon_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(ulong32) * 5 + sizeof(int)); return err; } diff --git a/src/ltc/ciphers/rc2.c b/src/ltc/ciphers/rc2.c index f4c68ec0..4832424b 100644 --- a/src/ltc/ciphers/rc2.c +++ b/src/ltc/ciphers/rc2.c @@ -139,7 +139,7 @@ int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rc2_ecb_encrypt( const unsigned char *pt, +static int s_rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else @@ -200,7 +200,7 @@ int rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _rc2_ecb_encrypt(pt, ct, skey); + int err = s_rc2_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(unsigned *) + sizeof(unsigned) * 5); return err; } @@ -217,7 +217,7 @@ int rc2_ecb_encrypt( const unsigned char *pt, @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rc2_ecb_decrypt( const unsigned char *ct, +static int s_rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else @@ -279,7 +279,7 @@ int rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _rc2_ecb_decrypt(ct, pt, skey); + int err = s_rc2_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(unsigned *) + sizeof(unsigned) * 4 + sizeof(int)); return err; } diff --git a/src/ltc/ciphers/rc5.c b/src/ltc/ciphers/rc5.c index b6d32475..f21ba4f4 100644 --- a/src/ltc/ciphers/rc5.c +++ b/src/ltc/ciphers/rc5.c @@ -43,7 +43,7 @@ static const ulong32 stab[50] = { @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) +static int s_rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #else int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #endif @@ -104,7 +104,7 @@ int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) { int x; - x = _rc5_setup(key, keylen, num_rounds, skey); + x = s_rc5_setup(key, keylen, num_rounds, skey); burn_stack(sizeof(ulong32) * 122 + sizeof(int)); return x; } @@ -118,7 +118,7 @@ int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -164,7 +164,7 @@ int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_ #ifdef LTC_CLEAN_STACK int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _rc5_ecb_encrypt(pt, ct, skey); + int err = s_rc5_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(ulong32) * 2 + sizeof(int)); return err; } @@ -178,7 +178,7 @@ int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_ @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -225,7 +225,7 @@ int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_ #ifdef LTC_CLEAN_STACK int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _rc5_ecb_decrypt(ct, pt, skey); + int err = s_rc5_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(ulong32) * 2 + sizeof(int)); return err; } diff --git a/src/ltc/ciphers/rc6.c b/src/ltc/ciphers/rc6.c index 02e1e983..d1341d31 100644 --- a/src/ltc/ciphers/rc6.c +++ b/src/ltc/ciphers/rc6.c @@ -40,7 +40,7 @@ static const ulong32 stab[44] = { @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) +static int s_rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #else int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #endif @@ -99,7 +99,7 @@ int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) { int x; - x = _rc6_setup(key, keylen, num_rounds, skey); + x = s_rc6_setup(key, keylen, num_rounds, skey); burn_stack(sizeof(ulong32) * 122); return x; } @@ -112,7 +112,7 @@ int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke @param skey The key as scheduled */ #ifdef LTC_CLEAN_STACK -static int _rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -154,7 +154,7 @@ int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_ #ifdef LTC_CLEAN_STACK int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _rc6_ecb_encrypt(pt, ct, skey); + int err = s_rc6_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(ulong32) * 6 + sizeof(int)); return err; } @@ -167,7 +167,7 @@ int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_ @param skey The key as scheduled */ #ifdef LTC_CLEAN_STACK -static int _rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -211,7 +211,7 @@ int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_ #ifdef LTC_CLEAN_STACK int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _rc6_ecb_decrypt(ct, pt, skey); + int err = s_rc6_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(ulong32) * 6 + sizeof(int)); return err; } diff --git a/src/ltc/ciphers/safer/safer.c b/src/ltc/ciphers/safer/safer.c index 4c798464..84cc2d01 100644 --- a/src/ltc/ciphers/safer/safer.c +++ b/src/ltc/ciphers/safer/safer.c @@ -24,7 +24,7 @@ #ifdef LTC_SAFER -#define __LTC_SAFER_TAB_C__ +#define LTC_SAFER_TAB_C #include "safer_tab.c" const struct ltc_cipher_descriptor safer_k64_desc = { @@ -91,13 +91,13 @@ const struct ltc_cipher_descriptor safer_k64_desc = { /******************* Types ****************************************************/ #ifdef LTC_CLEAN_STACK -static void _Safer_Expand_Userkey(const unsigned char *userkey_1, +static void s_safer_expand_userkey(const unsigned char *userkey_1, const unsigned char *userkey_2, unsigned int nof_rounds, int strengthened, safer_key_t key) #else -static void Safer_Expand_Userkey(const unsigned char *userkey_1, +static void safer_expand_userkey(const unsigned char *userkey_1, const unsigned char *userkey_2, unsigned int nof_rounds, int strengthened, @@ -160,13 +160,13 @@ static void Safer_Expand_Userkey(const unsigned char *userkey_1, } #ifdef LTC_CLEAN_STACK -static void Safer_Expand_Userkey(const unsigned char *userkey_1, +static void safer_expand_userkey(const unsigned char *userkey_1, const unsigned char *userkey_2, unsigned int nof_rounds, int strengthened, safer_key_t key) { - _Safer_Expand_Userkey(userkey_1, userkey_2, nof_rounds, strengthened, key); + s_safer_expand_userkey(userkey_1, userkey_2, nof_rounds, strengthened, key); burn_stack(sizeof(unsigned char) * (2 * (LTC_SAFER_BLOCK_LEN + 1)) + sizeof(unsigned int)*2); } #endif @@ -184,7 +184,7 @@ int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmet return CRYPT_INVALID_KEYSIZE; } - Safer_Expand_Userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); + safer_expand_userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); return CRYPT_OK; } @@ -201,7 +201,7 @@ int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symme return CRYPT_INVALID_KEYSIZE; } - Safer_Expand_Userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); + safer_expand_userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); return CRYPT_OK; } @@ -218,7 +218,7 @@ int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symme return CRYPT_INVALID_KEYSIZE; } - Safer_Expand_Userkey(key, key+8, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); + safer_expand_userkey(key, key+8, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); return CRYPT_OK; } @@ -235,12 +235,12 @@ int safer_sk128_setup(const unsigned char *key, int keylen, int num_rounds, symm return CRYPT_INVALID_KEYSIZE; } - Safer_Expand_Userkey(key, key+8, (unsigned int)(num_rounds != 0?num_rounds:LTC_SAFER_SK128_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); + safer_expand_userkey(key, key+8, (unsigned int)(num_rounds != 0?num_rounds:LTC_SAFER_SK128_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); return CRYPT_OK; } #ifdef LTC_CLEAN_STACK -static int _safer_ecb_encrypt(const unsigned char *pt, +static int s_safer_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else @@ -287,14 +287,14 @@ int safer_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _safer_ecb_encrypt(pt, ct, skey); + int err = s_safer_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(unsigned char) * 9 + sizeof(unsigned int) + sizeof(unsigned char *)); return err; } #endif #ifdef LTC_CLEAN_STACK -static int _safer_ecb_decrypt(const unsigned char *ct, +static int s_safer_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else @@ -342,7 +342,7 @@ int safer_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _safer_ecb_decrypt(ct, pt, skey); + int err = s_safer_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(unsigned char) * 9 + sizeof(unsigned int) + sizeof(unsigned char *)); return err; } diff --git a/src/ltc/ciphers/safer/safer_tab.c b/src/ltc/ciphers/safer/safer_tab.c index b93f3f24..4cc0e476 100644 --- a/src/ltc/ciphers/safer/safer_tab.c +++ b/src/ltc/ciphers/safer/safer_tab.c @@ -6,7 +6,7 @@ Tables for LTC_SAFER block ciphers */ -#ifdef __LTC_SAFER_TAB_C__ +#ifdef LTC_SAFER_TAB_C /* This is the box defined by ebox[x] = 45^x mod 257. * Its assumed that the value "256" corresponds to zero. */ @@ -49,6 +49,6 @@ static const unsigned char safer_lbox[256] = { 184, 64, 120, 45, 58, 233, 100, 31, 146, 144, 125, 57, 111, 224, 137, 48 }; -#endif /* __LTC_SAFER_TAB_C__ */ +#endif /* LTC_SAFER_TAB_C */ diff --git a/src/ltc/ciphers/safer/saferp.c b/src/ltc/ciphers/safer/saferp.c index 6ee2719c..86cc7089 100644 --- a/src/ltc/ciphers/safer/saferp.c +++ b/src/ltc/ciphers/safer/saferp.c @@ -9,7 +9,7 @@ #ifdef LTC_SAFERP -#define __LTC_SAFER_TAB_C__ +#define LTC_SAFER_TAB_C #include "safer_tab.c" const struct ltc_cipher_descriptor saferp_desc = @@ -137,37 +137,37 @@ const struct ltc_cipher_descriptor saferp_desc = #ifdef LTC_SMALL_CODE -static void _round(unsigned char *b, int i, const symmetric_key *skey) +static void s_round(unsigned char *b, int i, const symmetric_key *skey) { ROUND(b, i); } -static void _iround(unsigned char *b, int i, const symmetric_key *skey) +static void s_iround(unsigned char *b, int i, const symmetric_key *skey) { iROUND(b, i); } -static void _lt(unsigned char *b, unsigned char *b2) +static void s_lt(unsigned char *b, unsigned char *b2) { LT(b, b2); } -static void _ilt(unsigned char *b, unsigned char *b2) +static void s_ilt(unsigned char *b, unsigned char *b2) { iLT(b, b2); } #undef ROUND -#define ROUND(b, i) _round(b, i, skey) +#define ROUND(b, i) s_round(b, i, skey) #undef iROUND -#define iROUND(b, i) _iround(b, i, skey) +#define iROUND(b, i) s_iround(b, i, skey) #undef LT -#define LT(b, b2) _lt(b, b2) +#define LT(b, b2) s_lt(b, b2) #undef iLT -#define iLT(b, b2) _ilt(b, b2) +#define iLT(b, b2) s_ilt(b, b2) #endif diff --git a/src/ltc/ciphers/serpent.c b/src/ltc/ciphers/serpent.c index f40e8382..dbb999eb 100644 --- a/src/ltc/ciphers/serpent.c +++ b/src/ltc/ciphers/serpent.c @@ -27,7 +27,7 @@ const struct ltc_cipher_descriptor serpent_desc = { }; /* linear transformation */ -#define _LT(i,a,b,c,d,e) { \ +#define s_lt(i,a,b,c,d,e) { \ a = ROLc(a, 13); \ c = ROLc(c, 3); \ d = ROLc(d ^ c ^ (a << 3), 7); \ @@ -37,7 +37,7 @@ const struct ltc_cipher_descriptor serpent_desc = { } /* inverse linear transformation */ -#define _ILT(i,a,b,c,d,e) { \ +#define s_ilt(i,a,b,c,d,e) { \ c = RORc(c, 22); \ a = RORc(a, 5); \ c ^= d ^ (b << 7); \ @@ -50,32 +50,32 @@ const struct ltc_cipher_descriptor serpent_desc = { } /* order of output from S-box functions */ -#define _beforeS0(f) f(0,a,b,c,d,e) -#define _afterS0(f) f(1,b,e,c,a,d) -#define _afterS1(f) f(2,c,b,a,e,d) -#define _afterS2(f) f(3,a,e,b,d,c) -#define _afterS3(f) f(4,e,b,d,c,a) -#define _afterS4(f) f(5,b,a,e,c,d) -#define _afterS5(f) f(6,a,c,b,e,d) -#define _afterS6(f) f(7,a,c,d,b,e) -#define _afterS7(f) f(8,d,e,b,a,c) +#define s_beforeS0(f) f(0,a,b,c,d,e) +#define s_afterS0(f) f(1,b,e,c,a,d) +#define s_afterS1(f) f(2,c,b,a,e,d) +#define s_afterS2(f) f(3,a,e,b,d,c) +#define s_afterS3(f) f(4,e,b,d,c,a) +#define s_afterS4(f) f(5,b,a,e,c,d) +#define s_afterS5(f) f(6,a,c,b,e,d) +#define s_afterS6(f) f(7,a,c,d,b,e) +#define s_afterS7(f) f(8,d,e,b,a,c) /* order of output from inverse S-box functions */ -#define _beforeI7(f) f(8,a,b,c,d,e) -#define _afterI7(f) f(7,d,a,b,e,c) -#define _afterI6(f) f(6,a,b,c,e,d) -#define _afterI5(f) f(5,b,d,e,c,a) -#define _afterI4(f) f(4,b,c,e,a,d) -#define _afterI3(f) f(3,a,b,e,c,d) -#define _afterI2(f) f(2,b,d,e,c,a) -#define _afterI1(f) f(1,a,b,c,e,d) -#define _afterI0(f) f(0,a,d,b,e,c) +#define s_beforeI7(f) f(8,a,b,c,d,e) +#define s_afterI7(f) f(7,d,a,b,e,c) +#define s_afterI6(f) f(6,a,b,c,e,d) +#define s_afterI5(f) f(5,b,d,e,c,a) +#define s_afterI4(f) f(4,b,c,e,a,d) +#define s_afterI3(f) f(3,a,b,e,c,d) +#define s_afterI2(f) f(2,b,d,e,c,a) +#define s_afterI1(f) f(1,a,b,c,e,d) +#define s_afterI0(f) f(0,a,d,b,e,c) /* The instruction sequences for the S-box functions * come from Dag Arne Osvik's paper "Speeding up Serpent". */ -#define _S0(i, r0, r1, r2, r3, r4) { \ +#define s_s0(i, r0, r1, r2, r3, r4) { \ r3 ^= r0; \ r4 = r1; \ r1 &= r3; \ @@ -96,7 +96,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r4 ^= r3; \ } -#define _I0(i, r0, r1, r2, r3, r4) { \ +#define s_i0(i, r0, r1, r2, r3, r4) { \ r2 = ~r2; \ r4 = r1; \ r1 |= r0; \ @@ -118,7 +118,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r4 ^= r2; \ } -#define _S1(i, r0, r1, r2, r3, r4) { \ +#define s_s1(i, r0, r1, r2, r3, r4) { \ r0 = ~r0; \ r2 = ~r2; \ r4 = r0; \ @@ -139,7 +139,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r0 ^= r4; \ } -#define _I1(i, r0, r1, r2, r3, r4) { \ +#define s_i1(i, r0, r1, r2, r3, r4) { \ r4 = r1; \ r1 ^= r3; \ r3 &= r1; \ @@ -161,7 +161,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r3 ^= r1; \ } -#define _S2(i, r0, r1, r2, r3, r4) { \ +#define s_s2(i, r0, r1, r2, r3, r4) { \ r4 = r0; \ r0 &= r2; \ r0 ^= r3; \ @@ -180,7 +180,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r4 = ~r4; \ } -#define _I2(i, r0, r1, r2, r3, r4) { \ +#define s_i2(i, r0, r1, r2, r3, r4) { \ r2 ^= r3; \ r3 ^= r0; \ r4 = r3; \ @@ -202,7 +202,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r3 ^= r0; \ } -#define _S3(i, r0, r1, r2, r3, r4) { \ +#define s_s3(i, r0, r1, r2, r3, r4) { \ r4 = r0; \ r0 |= r3; \ r3 ^= r1; \ @@ -224,7 +224,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r1 ^= r0; \ } -#define _I3(i, r0, r1, r2, r3, r4) { \ +#define s_i3(i, r0, r1, r2, r3, r4) { \ r4 = r2; \ r2 ^= r1; \ r1 &= r2; \ @@ -245,7 +245,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r2 ^= r4; \ } -#define _S4(i, r0, r1, r2, r3, r4) { \ +#define s_s4(i, r0, r1, r2, r3, r4) { \ r1 ^= r3; \ r3 = ~r3; \ r2 ^= r3; \ @@ -268,7 +268,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r4 ^= r2; \ } -#define _I4(i, r0, r1, r2, r3, r4) { \ +#define s_i4(i, r0, r1, r2, r3, r4) { \ r4 = r2; \ r2 &= r3; \ r2 ^= r1; \ @@ -291,7 +291,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r2 ^= r1; \ } -#define _S5(i, r0, r1, r2, r3, r4) { \ +#define s_s5(i, r0, r1, r2, r3, r4) { \ r0 ^= r1; \ r1 ^= r3; \ r3 = ~r3; \ @@ -313,7 +313,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r2 ^= r4; \ } -#define _I5(i, r0, r1, r2, r3, r4) { \ +#define s_i5(i, r0, r1, r2, r3, r4) { \ r1 = ~r1; \ r4 = r3; \ r2 ^= r1; \ @@ -335,7 +335,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r4 = ~r4; \ } -#define _S6(i, r0, r1, r2, r3, r4) { \ +#define s_s6(i, r0, r1, r2, r3, r4) { \ r2 = ~r2; \ r4 = r3; \ r3 &= r0; \ @@ -356,7 +356,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r2 ^= r3; \ } -#define _I6(i, r0, r1, r2, r3, r4) { \ +#define s_i6(i, r0, r1, r2, r3, r4) { \ r0 ^= r2; \ r4 = r2; \ r2 &= r0; \ @@ -376,7 +376,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r4 ^= r0; \ } -#define _S7(i, r0, r1, r2, r3, r4) { \ +#define s_s7(i, r0, r1, r2, r3, r4) { \ r4 = r2; \ r2 &= r1; \ r2 ^= r3; \ @@ -399,7 +399,7 @@ const struct ltc_cipher_descriptor serpent_desc = { r4 ^= r1; \ } -#define _I7(i, r0, r1, r2, r3, r4) { \ +#define s_i7(i, r0, r1, r2, r3, r4) { \ r4 = r2; \ r2 ^= r0; \ r0 &= r3; \ @@ -422,28 +422,28 @@ const struct ltc_cipher_descriptor serpent_desc = { } /* key xor */ -#define _KX(r, a, b, c, d, e) { \ +#define s_kx(r, a, b, c, d, e) { \ a ^= k[4 * r + 0]; \ b ^= k[4 * r + 1]; \ c ^= k[4 * r + 2]; \ d ^= k[4 * r + 3]; \ } -#define _LK(r, a, b, c, d, e) { \ +#define s_lk(r, a, b, c, d, e) { \ a = k[(8-r)*4 + 0]; \ b = k[(8-r)*4 + 1]; \ c = k[(8-r)*4 + 2]; \ d = k[(8-r)*4 + 3]; \ } -#define _SK(r, a, b, c, d, e) { \ +#define s_sk(r, a, b, c, d, e) { \ k[(8-r)*4 + 4] = a; \ k[(8-r)*4 + 5] = b; \ k[(8-r)*4 + 6] = c; \ k[(8-r)*4 + 7] = d; \ } -static int _setup_key(const unsigned char *key, int keylen, int rounds, ulong32 *k) +static int s_setup_key(const unsigned char *key, int keylen, int rounds, ulong32 *k) { int i; ulong32 t; @@ -467,22 +467,22 @@ static int _setup_key(const unsigned char *key, int keylen, int rounds, ulong32 k -= 20; for (i = 0; i < rounds/8; i++) { - _afterS2(_LK); _afterS2(_S3); _afterS3(_SK); - _afterS1(_LK); _afterS1(_S2); _afterS2(_SK); - _afterS0(_LK); _afterS0(_S1); _afterS1(_SK); - _beforeS0(_LK); _beforeS0(_S0); _afterS0(_SK); + s_afterS2(s_lk); s_afterS2(s_s3); s_afterS3(s_sk); + s_afterS1(s_lk); s_afterS1(s_s2); s_afterS2(s_sk); + s_afterS0(s_lk); s_afterS0(s_s1); s_afterS1(s_sk); + s_beforeS0(s_lk); s_beforeS0(s_s0); s_afterS0(s_sk); k += 8*4; - _afterS6(_LK); _afterS6(_S7); _afterS7(_SK); - _afterS5(_LK); _afterS5(_S6); _afterS6(_SK); - _afterS4(_LK); _afterS4(_S5); _afterS5(_SK); - _afterS3(_LK); _afterS3(_S4); _afterS4(_SK); + s_afterS6(s_lk); s_afterS6(s_s7); s_afterS7(s_sk); + s_afterS5(s_lk); s_afterS5(s_s6); s_afterS6(s_sk); + s_afterS4(s_lk); s_afterS4(s_s5); s_afterS5(s_sk); + s_afterS3(s_lk); s_afterS3(s_s4); s_afterS4(s_sk); } - _afterS2(_LK); _afterS2(_S3); _afterS3(_SK); + s_afterS2(s_lk); s_afterS2(s_s3); s_afterS3(s_sk); return CRYPT_OK; } -static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32 *k) +static int s_enc_block(const unsigned char *in, unsigned char *out, const ulong32 *k) { ulong32 a, b, c, d, e; unsigned int i = 1; @@ -493,14 +493,14 @@ static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32 LOAD32L(d, in + 12); do { - _beforeS0(_KX); _beforeS0(_S0); _afterS0(_LT); - _afterS0(_KX); _afterS0(_S1); _afterS1(_LT); - _afterS1(_KX); _afterS1(_S2); _afterS2(_LT); - _afterS2(_KX); _afterS2(_S3); _afterS3(_LT); - _afterS3(_KX); _afterS3(_S4); _afterS4(_LT); - _afterS4(_KX); _afterS4(_S5); _afterS5(_LT); - _afterS5(_KX); _afterS5(_S6); _afterS6(_LT); - _afterS6(_KX); _afterS6(_S7); + s_beforeS0(s_kx); s_beforeS0(s_s0); s_afterS0(s_lt); + s_afterS0(s_kx); s_afterS0(s_s1); s_afterS1(s_lt); + s_afterS1(s_kx); s_afterS1(s_s2); s_afterS2(s_lt); + s_afterS2(s_kx); s_afterS2(s_s3); s_afterS3(s_lt); + s_afterS3(s_kx); s_afterS3(s_s4); s_afterS4(s_lt); + s_afterS4(s_kx); s_afterS4(s_s5); s_afterS5(s_lt); + s_afterS5(s_kx); s_afterS5(s_s6); s_afterS6(s_lt); + s_afterS6(s_kx); s_afterS6(s_s7); if (i == 4) break; @@ -511,10 +511,10 @@ static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32 d = a; a = e; k += 32; - _beforeS0(_LT); + s_beforeS0(s_lt); } while (1); - _afterS7(_KX); + s_afterS7(s_kx); STORE32L(d, out + 0); STORE32L(e, out + 4); @@ -524,7 +524,7 @@ static int _enc_block(const unsigned char *in, unsigned char *out, const ulong32 return CRYPT_OK; } -static int _dec_block(const unsigned char *in, unsigned char *out, const ulong32 *k) +static int s_dec_block(const unsigned char *in, unsigned char *out, const ulong32 *k) { ulong32 a, b, c, d, e; unsigned int i; @@ -537,7 +537,7 @@ static int _dec_block(const unsigned char *in, unsigned char *out, const ulong32 i = 4; k += 96; - _beforeI7(_KX); + s_beforeI7(s_kx); goto start; do { @@ -545,16 +545,16 @@ static int _dec_block(const unsigned char *in, unsigned char *out, const ulong32 b = d; d = e; k -= 32; - _beforeI7(_ILT); + s_beforeI7(s_ilt); start: - _beforeI7(_I7); _afterI7(_KX); - _afterI7(_ILT); _afterI7(_I6); _afterI6(_KX); - _afterI6(_ILT); _afterI6(_I5); _afterI5(_KX); - _afterI5(_ILT); _afterI5(_I4); _afterI4(_KX); - _afterI4(_ILT); _afterI4(_I3); _afterI3(_KX); - _afterI3(_ILT); _afterI3(_I2); _afterI2(_KX); - _afterI2(_ILT); _afterI2(_I1); _afterI1(_KX); - _afterI1(_ILT); _afterI1(_I0); _afterI0(_KX); + s_beforeI7(s_i7); s_afterI7(s_kx); + s_afterI7(s_ilt); s_afterI7(s_i6); s_afterI6(s_kx); + s_afterI6(s_ilt); s_afterI6(s_i5); s_afterI5(s_kx); + s_afterI5(s_ilt); s_afterI5(s_i4); s_afterI4(s_kx); + s_afterI4(s_ilt); s_afterI4(s_i3); s_afterI3(s_kx); + s_afterI3(s_ilt); s_afterI3(s_i2); s_afterI2(s_kx); + s_afterI2(s_ilt); s_afterI2(s_i1); s_afterI1(s_kx); + s_afterI1(s_ilt); s_afterI1(s_i0); s_afterI0(s_kx); } while (--i != 0); STORE32L(a, out + 0); @@ -575,7 +575,7 @@ int serpent_setup(const unsigned char *key, int keylen, int num_rounds, symmetri if (num_rounds != 0 && num_rounds != 32) return CRYPT_INVALID_ROUNDS; if (keylen != 16 && keylen != 24 && keylen != 32) return CRYPT_INVALID_KEYSIZE; - err = _setup_key(key, keylen, 32, skey->serpent.k); + err = s_setup_key(key, keylen, 32, skey->serpent.k); #ifdef LTC_CLEAN_STACK burn_stack(sizeof(ulong32) * 14 + sizeof(int)); #endif @@ -584,7 +584,7 @@ int serpent_setup(const unsigned char *key, int keylen, int num_rounds, symmetri int serpent_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _enc_block(pt, ct, skey->serpent.k); + int err = s_enc_block(pt, ct, skey->serpent.k); #ifdef LTC_CLEAN_STACK burn_stack(sizeof(ulong32) * 5 + sizeof(int)); #endif @@ -593,7 +593,7 @@ int serpent_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet int serpent_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _dec_block(ct, pt, skey->serpent.k); + int err = s_dec_block(ct, pt, skey->serpent.k); #ifdef LTC_CLEAN_STACK burn_stack(sizeof(ulong32) * 5 + sizeof(int)); #endif diff --git a/src/ltc/ciphers/skipjack.c b/src/ltc/ciphers/skipjack.c index 2ab49f84..0251946a 100644 --- a/src/ltc/ciphers/skipjack.c +++ b/src/ltc/ciphers/skipjack.c @@ -133,7 +133,7 @@ static unsigned ig_func(unsigned w, int *kp, const unsigned char *key) @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -183,7 +183,7 @@ int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme #ifdef LTC_CLEAN_STACK int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _skipjack_ecb_encrypt(pt, ct, skey); + int err = s_skipjack_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(unsigned) * 8 + sizeof(int) * 2); return err; } @@ -197,7 +197,7 @@ int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symme @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -251,7 +251,7 @@ int skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symme #ifdef LTC_CLEAN_STACK int skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err = _skipjack_ecb_decrypt(ct, pt, skey); + int err = s_skipjack_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(unsigned) * 7 + sizeof(int) * 2); return err; } diff --git a/src/ltc/ciphers/twofish/twofish.c b/src/ltc/ciphers/twofish/twofish.c index 127d138b..c006361b 100644 --- a/src/ltc/ciphers/twofish/twofish.c +++ b/src/ltc/ciphers/twofish/twofish.c @@ -58,7 +58,7 @@ static const unsigned char qord[4][5] = { #ifdef LTC_TWOFISH_TABLES -#define __LTC_TWOFISH_TAB_C__ +#define LTC_TWOFISH_TAB_C #include "twofish_tab.c" #define sbox(i, x) ((ulong32)SBOX[i][(x)&255]) @@ -83,7 +83,7 @@ static const unsigned char qbox[2][4][16] = { /* computes S_i[x] */ #ifdef LTC_CLEAN_STACK -static ulong32 _sbox(int i, ulong32 x) +static ulong32 s_sbox(int i, ulong32 x) #else static ulong32 sbox(int i, ulong32 x) #endif @@ -125,7 +125,7 @@ static ulong32 sbox(int i, ulong32 x) static ulong32 sbox(int i, ulong32 x) { ulong32 y; - y = _sbox(i, x); + y = s_sbox(i, x); burn_stack(sizeof(unsigned char) * 11); return y; } @@ -282,7 +282,7 @@ static void h_func(const unsigned char *in, unsigned char *out, const unsigned c #else #ifdef LTC_CLEAN_STACK -static ulong32 _g_func(ulong32 x, const symmetric_key *key) +static ulong32 s_g_func(ulong32 x, const symmetric_key *key) #else static ulong32 g_func(ulong32 x, const symmetric_key *key) #endif @@ -318,7 +318,7 @@ static ulong32 g_func(ulong32 x, const symmetric_key *key) static ulong32 g_func(ulong32 x, const symmetric_key *key) { ulong32 y; - y = _g_func(x, key); + y = s_g_func(x, key); burn_stack(sizeof(unsigned char) * 4 + sizeof(ulong32)); return y; } @@ -335,7 +335,7 @@ static ulong32 g_func(ulong32 x, const symmetric_key *key) @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) +static int s_twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #else int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) #endif @@ -448,7 +448,7 @@ int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetri int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) { int x; - x = _twofish_setup(key, keylen, num_rounds, skey); + x = s_twofish_setup(key, keylen, num_rounds, skey); burn_stack(sizeof(int) * 7 + sizeof(unsigned char) * 56 + sizeof(ulong32) * 2); return x; } @@ -462,7 +462,7 @@ int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetri @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) +static int s_twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #else int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) #endif @@ -522,7 +522,7 @@ int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet #ifdef LTC_CLEAN_STACK int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) { - int err = _twofish_ecb_encrypt(pt, ct, skey); + int err = s_twofish_ecb_encrypt(pt, ct, skey); burn_stack(sizeof(ulong32) * 10 + sizeof(int)); return err; } @@ -536,7 +536,7 @@ int twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmet @return CRYPT_OK if successful */ #ifdef LTC_CLEAN_STACK -static int _twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) +static int s_twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #else int twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) #endif @@ -598,7 +598,7 @@ int twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmet #ifdef LTC_CLEAN_STACK int twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) { - int err =_twofish_ecb_decrypt(ct, pt, skey); + int err = s_twofish_ecb_decrypt(ct, pt, skey); burn_stack(sizeof(ulong32) * 10 + sizeof(int)); return err; } diff --git a/src/ltc/ciphers/twofish/twofish_tab.c b/src/ltc/ciphers/twofish/twofish_tab.c index d6cc874c..e52d2847 100644 --- a/src/ltc/ciphers/twofish/twofish_tab.c +++ b/src/ltc/ciphers/twofish/twofish_tab.c @@ -6,7 +6,7 @@ Twofish tables, Tom St Denis */ #ifdef LTC_TWOFISH_TABLES -#ifdef __LTC_TWOFISH_TAB_C__ +#ifdef LTC_TWOFISH_TAB_C /* pre generated 8x8 tables from the four 4x4s */ static const unsigned char SBOX[2][256] = { @@ -482,5 +482,5 @@ static const ulong32 rs_tab7[256] = { #endif /* LTC_TWOFISH_ALL_TABLES */ -#endif /* __LTC_TWOFISH_TAB_C__ */ +#endif /* LTC_TWOFISH_TAB_C */ #endif |