summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorStoian Ivanov <s.ivanov@teracomm.bg>2017-12-05 13:54:55 +0100
committerStoian Ivanov <s.ivanov@teracomm.bg>2017-12-05 13:54:55 +0100
commitc2f84e4f4c5d935beeecb6495df3ea205e65efcf (patch)
treef0d7f169ec1ee1ab2266e0a13bc4714ba116cb2b
parentinplace api and test, Makefile update (diff)
parentUpdate README.md (diff)
downloadtiny-AES-c-c2f84e4f4c5d935beeecb6495df3ea205e65efcf.tar
tiny-AES-c-c2f84e4f4c5d935beeecb6495df3ea205e65efcf.tar.gz
tiny-AES-c-c2f84e4f4c5d935beeecb6495df3ea205e65efcf.tar.bz2
tiny-AES-c-c2f84e4f4c5d935beeecb6495df3ea205e65efcf.tar.lz
tiny-AES-c-c2f84e4f4c5d935beeecb6495df3ea205e65efcf.tar.xz
tiny-AES-c-c2f84e4f4c5d935beeecb6495df3ea205e65efcf.tar.zst
tiny-AES-c-c2f84e4f4c5d935beeecb6495df3ea205e65efcf.zip
-rw-r--r--README.md2
-rw-r--r--aes.c27
2 files changed, 5 insertions, 24 deletions
diff --git a/README.md b/README.md
index eaa13ee..ebef638 100644
--- a/README.md
+++ b/README.md
@@ -20,7 +20,7 @@ void AES_CTR_xcrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, con
You can choose to use any or all of the modes-of-operations, by defining the symbols CBC, CTR or ECB. See the header file for clarification.
-There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length.
+There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input.
The module uses less than 200 bytes of RAM and 1-2K ROM when compiled for ARM, but YMMV depending on which modes are enabled.
diff --git a/aes.c b/aes.c
index 030e8b1..9dc3aba 100644
--- a/aes.c
+++ b/aes.c
@@ -117,7 +117,7 @@ static const uint8_t rsbox[256] = {
0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d };
// The round constant word array, Rcon[i], contains the values given by
-// x to th e power (i-1) being powers of x (x is denoted as {02}) in the field GF(2^8)
+// x to the power (i-1) being powers of x (x is denoted as {02}) in the field GF(2^8)
static const uint8_t Rcon[11] = {
0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36 };
@@ -129,28 +129,8 @@ static const uint8_t Rcon[11] = {
*
* "Only the first some of these constants are actually used – up to rcon[10] for AES-128 (as 11 round keys are needed),
* up to rcon[8] for AES-192, up to rcon[7] for AES-256. rcon[0] is not used in AES algorithm."
- *
- * ... which is why the full array below has been 'disabled' below.
*/
-#if 0
-static const uint8_t Rcon[256] = {
- 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a,
- 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39,
- 0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a,
- 0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8,
- 0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef,
- 0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc,
- 0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b,
- 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3,
- 0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94,
- 0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20,
- 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35,
- 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f,
- 0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04,
- 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63,
- 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd,
- 0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d };
-#endif
+
/*****************************************************************************/
/* Private functions: */
@@ -197,6 +177,7 @@ static void KeyExpansion(uint8_t* RoundKey,const uint8_t* Key)
tempa[1]=RoundKey[k + 1];
tempa[2]=RoundKey[k + 2];
tempa[3]=RoundKey[k + 3];
+
}
if (i % Nk == 0)
@@ -268,7 +249,7 @@ static void AddRoundKey(uint8_t round,state_t *state,uint8_t*RoundKey)
{
for (j = 0; j < 4; ++j)
{
- (*state)[i][j] ^= RoundKey[round * Nb * 4 + i * Nb + j];
+ (*state)[i][j] ^= RoundKey[(round * Nb * 4) + (i * Nb) + j];
}
}
}