summaryrefslogtreecommitdiff
path: root/traces
diff options
context:
space:
mode:
Diffstat (limited to 'traces')
-rw-r--r--traces/add_threshold/traces-tbc.patch18
-rw-r--r--traces/traces-ae.patch18
-rw-r--r--traces/traces-tbc.patch12
3 files changed, 24 insertions, 24 deletions
diff --git a/traces/add_threshold/traces-tbc.patch b/traces/add_threshold/traces-tbc.patch
index 684569c..4943c9c 100644
--- a/traces/add_threshold/traces-tbc.patch
+++ b/traces/add_threshold/traces-tbc.patch
@@ -1,7 +1,7 @@
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/cipher.c b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/cipher.c
+diff --git a/src/add_threshold/cipher.c b/src/add_threshold/cipher.c
index 778a100..3b49db5 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/cipher.c
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/cipher.c
+--- a/src/add_threshold/cipher.c
++++ b/src/add_threshold/cipher.c
@@ -25,6 +25,8 @@ throughout the entire round function in order to avoid extra randomness
generation to switch from 2 shares to 3 shares and vice versa.
*/
@@ -218,10 +218,10 @@ index 778a100..3b49db5 100644
_one_round_egfn(X, Y, Z, RTK_X[ROUNDS-1], RTK_Y[ROUNDS-1], PERMUTATION_NONE);
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/random.c b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/random.c
+diff --git a/src/add_threshold/random.c b/src/add_threshold/random.c
index a966a8e..8d5f2cc 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/random.c
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/random.c
+--- a/src/add_threshold/random.c
++++ b/src/add_threshold/random.c
@@ -21,6 +21,8 @@ This file provides a system-specific function to generate random bytes.
#define _GNU_SOURCE
@@ -239,10 +239,10 @@ index a966a8e..8d5f2cc 100644
+ for (size_t i=0; i<nb; i++)
+ out[i] = i;
}
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/tweakey.c b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/tweakey.c
+diff --git a/src/add_threshold/tweakey.c b/src/add_threshold/tweakey.c
index 7822564..e1abbb6 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/tweakey.c
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/add_threshold/tweakey.c
+--- a/src/add_threshold/tweakey.c
++++ b/src/add_threshold/tweakey.c
@@ -20,6 +20,8 @@ This file provides a first-order threshold implementation of Lilliput-TBC's
tweakey schedule, where the tweak and the key are split into two shares.
*/
diff --git a/traces/traces-ae.patch b/traces/traces-ae.patch
index 0461861..194d6d9 100644
--- a/traces/traces-ae.patch
+++ b/traces/traces-ae.patch
@@ -1,7 +1,7 @@
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-i.c b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-i.c
+diff --git a/src/ref/lilliput-i.c b/src/ref/lilliput-i.c
index 6f869c3..f7bdbde 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-i.c
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-i.c
+--- a/src/ref/lilliput-i.c
++++ b/src/ref/lilliput-i.c
@@ -17,6 +17,8 @@ http://creativecommons.org/publicdomain/zero/1.0/
This file implements Lilliput-AE's nonce-respecting mode based on ΘCB3.
*/
@@ -135,10 +135,10 @@ index 6f869c3..f7bdbde 100644
}
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ii.c b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ii.c
+diff --git a/src/ref/lilliput-ii.c b/src/ref/lilliput-ii.c
index 862892c..7dfb38e 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ii.c
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ii.c
+--- a/src/ref/lilliput-ii.c
++++ b/src/ref/lilliput-ii.c
@@ -15,6 +15,8 @@ http://creativecommons.org/publicdomain/zero/1.0/
This file implements Lilliput-AE's nonce-misuse-resistant mode based on SCT-2.
*/
@@ -223,10 +223,10 @@ index 862892c..7dfb38e 100644
}
}
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ae-utils.h b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ae-utils.h
+diff --git a/src/ref/lilliput-ae-utils.h b/src/ref/lilliput-ae-utils.h
index 6b60adc..0bd77cf 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ae-utils.h
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/lilliput-ae-utils.h
+--- a/src/ref/lilliput-ae-utils.h
++++ b/src/ref/lilliput-ae-utils.h
@@ -18,6 +18,8 @@ This file provides functions used by both authenticated encryption modes.
#ifndef LILLIPUT_AE_UTILS_H
#define LILLIPUT_AE_UTILS_H
diff --git a/traces/traces-tbc.patch b/traces/traces-tbc.patch
index 22aaedd..db6880c 100644
--- a/traces/traces-tbc.patch
+++ b/traces/traces-tbc.patch
@@ -1,7 +1,7 @@
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/cipher.c b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/cipher.c
+diff --git a/src/ref/cipher.c b/src/ref/cipher.c
index b6b309e..011bc70 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/cipher.c
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/cipher.c
+--- a/src/ref/cipher.c
++++ b/src/ref/cipher.c
@@ -17,6 +17,8 @@ http://creativecommons.org/publicdomain/zero/1.0/
This file provides the implementation for Lilliput-TBC.
*/
@@ -108,10 +108,10 @@ index b6b309e..011bc70 100644
_one_round_egfn(X, RTK[ROUNDS-1], PERMUTATION_NONE);
memcpy(ciphertext, X, BLOCK_BYTES);
-diff --git a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/tweakey.c b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/tweakey.c
+diff --git a/src/ref/tweakey.c b/src/ref/tweakey.c
index 510f35a..4bf027c 100644
---- a/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/tweakey.c
-+++ b/SOUMISSION_NIST/REFERENCE_IMPLEMENTATION/src/ref/tweakey.c
+--- a/src/ref/tweakey.c
++++ b/src/ref/tweakey.c
@@ -17,6 +17,8 @@ http://creativecommons.org/publicdomain/zero/1.0/
This file provides the implementation of Lilliput-TBC's tweakey schedule.
*/