diff options
author | Petter Rodhelind <petter.rodhelind@gmail.com> | 2020-01-14 11:41:08 +0100 |
---|---|---|
committer | Petter Rodhelind <petter.rodhelind@gmail.com> | 2020-01-14 11:41:08 +0100 |
commit | 02d7aa8915f9c3a3288dab01f321eb94ba219e3b (patch) | |
tree | f053238978479e408a2b83571443e132f30586ab /src/libsec/port/aes.c | |
parent | c0c9d8f883dfd3a7f5a74499d91bb95884b15873 (diff) | |
parent | 3d1382b98a502d0c34d5ba2c462396acc515016e (diff) | |
download | plan9port-02d7aa8915f9c3a3288dab01f321eb94ba219e3b.tar.gz plan9port-02d7aa8915f9c3a3288dab01f321eb94ba219e3b.tar.bz2 plan9port-02d7aa8915f9c3a3288dab01f321eb94ba219e3b.zip |
Merge remote-tracking branch 'upstream/master'
Diffstat (limited to 'src/libsec/port/aes.c')
-rw-r--r-- | src/libsec/port/aes.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/libsec/port/aes.c b/src/libsec/port/aes.c index 9cbb6bd9..7612842e 100644 --- a/src/libsec/port/aes.c +++ b/src/libsec/port/aes.c @@ -138,13 +138,13 @@ static int rijndaelKeySetup(u32 erk[/*4*(Nr + 1)*/], u32 drk[/*4*(Nr + 1)*/], co * invert the order of the round keys and * apply the inverse MixColumn transform to all round keys but the first and the last */ - drk[0 ] = erk[4*Nr ]; + drk[0 ] = erk[4*Nr ]; drk[1 ] = erk[4*Nr + 1]; - drk[2 ] = erk[4*Nr + 2]; + drk[2 ] = erk[4*Nr + 2]; drk[3 ] = erk[4*Nr + 3]; - drk[4*Nr ] = erk[0 ]; + drk[4*Nr ] = erk[0 ]; drk[4*Nr + 1] = erk[1 ]; - drk[4*Nr + 2] = erk[2 ]; + drk[4*Nr + 2] = erk[2 ]; drk[4*Nr + 3] = erk[3 ]; erk += 4 * Nr; for (i = 1; i < Nr; i++) { @@ -1443,7 +1443,7 @@ static void rijndaelEncryptRound(const u32 rk[/*4*(Nr + 1)*/], int Nr, u8 block[ (Te4[(s1 >> 8) & 0xff] << 8) ^ (Te4[(s2 ) & 0xff] ) ^ rk[3]; - + s0 = t0; s1 = t1; s2 = t2; |