X-Git-Url: https://git.ozlabs.org/?a=blobdiff_plain;f=ccan%2Fcrypto%2Fxtea%2Fxtea.c;h=43ce55733e7fc4ae4042515720bd6c00c7f2df19;hb=c16c021735d53348b6f5fe119e35feea85e6638e;hp=28435d6a97c09588e8642ba3f29efdfb304599b2;hpb=e5fb923ba3735c758ef795eb69d5ee1c6f0a94e9;p=ccan diff --git a/ccan/crypto/xtea/xtea.c b/ccan/crypto/xtea/xtea.c index 28435d6a..43ce5573 100644 --- a/ccan/crypto/xtea/xtea.c +++ b/ccan/crypto/xtea/xtea.c @@ -11,8 +11,9 @@ uint64_t xtea_encipher(const struct xtea_secret *secret, uint64_t v) { const uint32_t delta=0x9E3779B9; uint32_t v0=(v>>32), v1=v, sum=0; + int i; - for (int i=0; i < NUM_DOUBLE_ROUNDS; i++) { + for (i=0; i < NUM_DOUBLE_ROUNDS; i++) { v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + secret->u.u32[sum & 3]); sum += delta; v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + secret->u.u32[(sum>>11) & 3]); @@ -24,8 +25,9 @@ uint64_t xtea_decipher(const struct xtea_secret *secret, uint64_t e) { const uint32_t delta=0x9E3779B9; uint32_t v0=(e>>32), v1=e, sum=delta*NUM_DOUBLE_ROUNDS; + int i; - for (int i=0; i < NUM_DOUBLE_ROUNDS; i++) { + for (i=0; i < NUM_DOUBLE_ROUNDS; i++) { v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + secret->u.u32[(sum>>11) & 3]); sum -= delta; v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + secret->u.u32[sum & 3]);