diff options
author | lloyd <[email protected]> | 2010-06-21 14:31:08 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2010-06-21 14:31:08 +0000 |
commit | b4fe5806546639fb78e630bdc5b323bf7988e9a1 (patch) | |
tree | 233dd4a61c587cb186d5dc5877dbfac53149897a /src/block/noekeon_simd | |
parent | 928760016bae3887dedf1344d4b3d2e70155ef63 (diff) |
In IDEA, Noekeon, Serpent, XTEA, provide and use ro accessor functions
for getting access to the key schedule, instead of giving the key
schedule protected status, which is much harder tu audit.
Diffstat (limited to 'src/block/noekeon_simd')
-rw-r--r-- | src/block/noekeon_simd/noekeon_simd.cpp | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/src/block/noekeon_simd/noekeon_simd.cpp b/src/block/noekeon_simd/noekeon_simd.cpp index f44104901..c36f269a4 100644 --- a/src/block/noekeon_simd/noekeon_simd.cpp +++ b/src/block/noekeon_simd/noekeon_simd.cpp @@ -55,6 +55,8 @@ namespace Botan { */ void Noekeon_SIMD::encrypt_n(const byte in[], byte out[], u32bit blocks) const { + const SecureVector<u32bit, 4>& EK = this->get_EK(); + SIMD_32 K0 = SIMD_32(EK[0]); SIMD_32 K1 = SIMD_32(EK[1]); SIMD_32 K2 = SIMD_32(EK[2]); @@ -109,6 +111,8 @@ void Noekeon_SIMD::encrypt_n(const byte in[], byte out[], u32bit blocks) const */ void Noekeon_SIMD::decrypt_n(const byte in[], byte out[], u32bit blocks) const { + const SecureVector<u32bit, 4>& DK = this->get_DK(); + SIMD_32 K0 = SIMD_32(DK[0]); SIMD_32 K1 = SIMD_32(DK[1]); SIMD_32 K2 = SIMD_32(DK[2]); |