aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/block/aes_ssse3
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/block/aes_ssse3')
-rw-r--r--src/lib/block/aes_ssse3/aes_ssse3.cpp48
-rw-r--r--src/lib/block/aes_ssse3/aes_ssse3.h6
2 files changed, 27 insertions, 27 deletions
diff --git a/src/lib/block/aes_ssse3/aes_ssse3.cpp b/src/lib/block/aes_ssse3/aes_ssse3.cpp
index 373a5265a..fa0cb787c 100644
--- a/src/lib/block/aes_ssse3/aes_ssse3.cpp
+++ b/src/lib/block/aes_ssse3/aes_ssse3.cpp
@@ -344,7 +344,7 @@ void AES_128_SSSE3::encrypt_n(const byte in[], byte out[], size_t blocks) const
const __m128i* in_mm = reinterpret_cast<const __m128i*>(in);
__m128i* out_mm = reinterpret_cast<__m128i*>(out);
- const __m128i* keys = reinterpret_cast<const __m128i*>(EK.data());
+ const __m128i* keys = reinterpret_cast<const __m128i*>(m_EK.data());
CT::poison(in, blocks * block_size());
@@ -366,7 +366,7 @@ void AES_128_SSSE3::decrypt_n(const byte in[], byte out[], size_t blocks) const
const __m128i* in_mm = reinterpret_cast<const __m128i*>(in);
__m128i* out_mm = reinterpret_cast<__m128i*>(out);
- const __m128i* keys = reinterpret_cast<const __m128i*>(DK.data());
+ const __m128i* keys = reinterpret_cast<const __m128i*>(m_DK.data());
CT::poison(in, blocks * block_size());
@@ -390,11 +390,11 @@ void AES_128_SSSE3::key_schedule(const byte keyb[], size_t)
__m128i key = _mm_loadu_si128(reinterpret_cast<const __m128i*>(keyb));
- EK.resize(11*4);
- DK.resize(11*4);
+ m_EK.resize(11*4);
+ m_DK.resize(11*4);
- __m128i* EK_mm = reinterpret_cast<__m128i*>(EK.data());
- __m128i* DK_mm = reinterpret_cast<__m128i*>(DK.data());
+ __m128i* EK_mm = reinterpret_cast<__m128i*>(m_EK.data());
+ __m128i* DK_mm = reinterpret_cast<__m128i*>(m_DK.data());
_mm_storeu_si128(DK_mm + 10, _mm_shuffle_epi8(key, sr[2]));
@@ -420,8 +420,8 @@ void AES_128_SSSE3::key_schedule(const byte keyb[], size_t)
void AES_128_SSSE3::clear()
{
- zap(EK);
- zap(DK);
+ zap(m_EK);
+ zap(m_DK);
}
/*
@@ -432,7 +432,7 @@ void AES_192_SSSE3::encrypt_n(const byte in[], byte out[], size_t blocks) const
const __m128i* in_mm = reinterpret_cast<const __m128i*>(in);
__m128i* out_mm = reinterpret_cast<__m128i*>(out);
- const __m128i* keys = reinterpret_cast<const __m128i*>(EK.data());
+ const __m128i* keys = reinterpret_cast<const __m128i*>(m_EK.data());
CT::poison(in, blocks * block_size());
@@ -454,7 +454,7 @@ void AES_192_SSSE3::decrypt_n(const byte in[], byte out[], size_t blocks) const
const __m128i* in_mm = reinterpret_cast<const __m128i*>(in);
__m128i* out_mm = reinterpret_cast<__m128i*>(out);
- const __m128i* keys = reinterpret_cast<const __m128i*>(DK.data());
+ const __m128i* keys = reinterpret_cast<const __m128i*>(m_DK.data());
CT::poison(in, blocks * block_size());
@@ -476,11 +476,11 @@ void AES_192_SSSE3::key_schedule(const byte keyb[], size_t)
__m128i rcon = _mm_set_epi32(0x702A9808, 0x4D7C7D81,
0x1F8391B9, 0xAF9DEEB6);
- EK.resize(13*4);
- DK.resize(13*4);
+ m_EK.resize(13*4);
+ m_DK.resize(13*4);
- __m128i* EK_mm = reinterpret_cast<__m128i*>(EK.data());
- __m128i* DK_mm = reinterpret_cast<__m128i*>(DK.data());
+ __m128i* EK_mm = reinterpret_cast<__m128i*>(m_EK.data());
+ __m128i* DK_mm = reinterpret_cast<__m128i*>(m_DK.data());
__m128i key1 = _mm_loadu_si128(reinterpret_cast<const __m128i*>(keyb));
__m128i key2 = _mm_loadu_si128(reinterpret_cast<const __m128i*>((keyb + 8)));
@@ -537,8 +537,8 @@ void AES_192_SSSE3::key_schedule(const byte keyb[], size_t)
void AES_192_SSSE3::clear()
{
- zap(EK);
- zap(DK);
+ zap(m_EK);
+ zap(m_DK);
}
/*
@@ -549,7 +549,7 @@ void AES_256_SSSE3::encrypt_n(const byte in[], byte out[], size_t blocks) const
const __m128i* in_mm = reinterpret_cast<const __m128i*>(in);
__m128i* out_mm = reinterpret_cast<__m128i*>(out);
- const __m128i* keys = reinterpret_cast<const __m128i*>(EK.data());
+ const __m128i* keys = reinterpret_cast<const __m128i*>(m_EK.data());
CT::poison(in, blocks * block_size());
@@ -571,7 +571,7 @@ void AES_256_SSSE3::decrypt_n(const byte in[], byte out[], size_t blocks) const
const __m128i* in_mm = reinterpret_cast<const __m128i*>(in);
__m128i* out_mm = reinterpret_cast<__m128i*>(out);
- const __m128i* keys = reinterpret_cast<const __m128i*>(DK.data());
+ const __m128i* keys = reinterpret_cast<const __m128i*>(m_DK.data());
CT::poison(in, blocks * block_size());
@@ -593,11 +593,11 @@ void AES_256_SSSE3::key_schedule(const byte keyb[], size_t)
__m128i rcon = _mm_set_epi32(0x702A9808, 0x4D7C7D81,
0x1F8391B9, 0xAF9DEEB6);
- EK.resize(15*4);
- DK.resize(15*4);
+ m_EK.resize(15*4);
+ m_DK.resize(15*4);
- __m128i* EK_mm = reinterpret_cast<__m128i*>(EK.data());
- __m128i* DK_mm = reinterpret_cast<__m128i*>(DK.data());
+ __m128i* EK_mm = reinterpret_cast<__m128i*>(m_EK.data());
+ __m128i* DK_mm = reinterpret_cast<__m128i*>(m_DK.data());
__m128i key1 = _mm_loadu_si128(reinterpret_cast<const __m128i*>(keyb));
__m128i key2 = _mm_loadu_si128(reinterpret_cast<const __m128i*>((keyb + 16)));
@@ -633,8 +633,8 @@ void AES_256_SSSE3::key_schedule(const byte keyb[], size_t)
void AES_256_SSSE3::clear()
{
- zap(EK);
- zap(DK);
+ zap(m_EK);
+ zap(m_DK);
}
}
diff --git a/src/lib/block/aes_ssse3/aes_ssse3.h b/src/lib/block/aes_ssse3/aes_ssse3.h
index 49e0346e4..1d09b5f61 100644
--- a/src/lib/block/aes_ssse3/aes_ssse3.h
+++ b/src/lib/block/aes_ssse3/aes_ssse3.h
@@ -27,7 +27,7 @@ class BOTAN_DLL AES_128_SSSE3 : public Block_Cipher_Fixed_Params<16, 16>
private:
void key_schedule(const byte[], size_t) override;
- secure_vector<u32bit> EK, DK;
+ secure_vector<u32bit> m_EK, m_DK;
};
/**
@@ -45,7 +45,7 @@ class BOTAN_DLL AES_192_SSSE3 : public Block_Cipher_Fixed_Params<16, 24>
private:
void key_schedule(const byte[], size_t) override;
- secure_vector<u32bit> EK, DK;
+ secure_vector<u32bit> m_EK, m_DK;
};
/**
@@ -63,7 +63,7 @@ class BOTAN_DLL AES_256_SSSE3 : public Block_Cipher_Fixed_Params<16, 32>
private:
void key_schedule(const byte[], size_t) override;
- secure_vector<u32bit> EK, DK;
+ secure_vector<u32bit> m_EK, m_DK;
};
}