Crypto algorithm implementations for the 65816
Go to file
Stephen Heumann 6c1d703b84 Don't duplicate identical code for the last three schedule computation phases.
This shrinks code size and is probably faster with accelerators due to caching.
2017-06-30 12:49:51 -05:00
aes.asm Add comments and copyright notices. 2017-06-27 23:30:58 -05:00
aes.h Add note about context size. 2017-06-28 01:26:24 -05:00
aes.macros state -> context 2017-06-29 16:52:34 -05:00
aesalign.asm Initial working implementation of AES-128 encryption. 2017-06-26 20:41:44 -05:00
aestest.c Usage message and indentation cleanups in test program. 2017-06-27 23:42:20 -05:00
rotate.macros Add macros for rotates. 2017-06-29 20:41:49 -05:00
sha1.asm Don't duplicate identical code for the last three schedule computation phases. 2017-06-30 12:49:51 -05:00
sha1.h Add implementation of the basic block-processing function for SHA-1. 2017-06-29 16:54:49 -05:00
sha1.macros Don't update index value in each unrolled loop iteration. 2017-06-30 00:52:25 -05:00
sha1test.c Add implementation of the basic block-processing function for SHA-1. 2017-06-29 16:54:49 -05:00