PageRenderTime 51ms CodeModel.GetById 21ms RepoModel.GetById 0ms app.codeStats 0ms

/src/crypto/blake256.c

https://gitlab.com/nexxuz/cryptonote
C | 326 lines | 263 code | 42 blank | 21 comment | 30 complexity | 0e540c93a385734dbcb12e670f66003f MD5 | raw file
  1. /*
  2. * The blake256_* and blake224_* functions are largely copied from
  3. * blake256_light.c and blake224_light.c from the BLAKE website:
  4. *
  5. * http://131002.net/blake/
  6. *
  7. * The hmac_* functions implement HMAC-BLAKE-256 and HMAC-BLAKE-224.
  8. * HMAC is specified by RFC 2104.
  9. */
  10. #include <string.h>
  11. #include <stdio.h>
  12. #include <stdint.h>
  13. #include "blake256.h"
  14. #define U8TO32(p) \
  15. (((uint32_t)((p)[0]) << 24) | ((uint32_t)((p)[1]) << 16) | \
  16. ((uint32_t)((p)[2]) << 8) | ((uint32_t)((p)[3]) ))
  17. #define U32TO8(p, v) \
  18. (p)[0] = (uint8_t)((v) >> 24); (p)[1] = (uint8_t)((v) >> 16); \
  19. (p)[2] = (uint8_t)((v) >> 8); (p)[3] = (uint8_t)((v) );
  20. const uint8_t sigma[][16] = {
  21. { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,15},
  22. {14,10, 4, 8, 9,15,13, 6, 1,12, 0, 2,11, 7, 5, 3},
  23. {11, 8,12, 0, 5, 2,15,13,10,14, 3, 6, 7, 1, 9, 4},
  24. { 7, 9, 3, 1,13,12,11,14, 2, 6, 5,10, 4, 0,15, 8},
  25. { 9, 0, 5, 7, 2, 4,10,15,14, 1,11,12, 6, 8, 3,13},
  26. { 2,12, 6,10, 0,11, 8, 3, 4,13, 7, 5,15,14, 1, 9},
  27. {12, 5, 1,15,14,13, 4,10, 0, 7, 6, 3, 9, 2, 8,11},
  28. {13,11, 7,14,12, 1, 3, 9, 5, 0,15, 4, 8, 6, 2,10},
  29. { 6,15,14, 9,11, 3, 0, 8,12, 2,13, 7, 1, 4,10, 5},
  30. {10, 2, 8, 4, 7, 6, 1, 5,15,11, 9,14, 3,12,13, 0},
  31. { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,15},
  32. {14,10, 4, 8, 9,15,13, 6, 1,12, 0, 2,11, 7, 5, 3},
  33. {11, 8,12, 0, 5, 2,15,13,10,14, 3, 6, 7, 1, 9, 4},
  34. { 7, 9, 3, 1,13,12,11,14, 2, 6, 5,10, 4, 0,15, 8}
  35. };
  36. const uint32_t cst[16] = {
  37. 0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344,
  38. 0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89,
  39. 0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
  40. 0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917
  41. };
  42. static const uint8_t padding[] = {
  43. 0x80,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
  44. 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
  45. };
  46. void blake256_compress(state *S, const uint8_t *block) {
  47. uint32_t v[16], m[16], i;
  48. #define ROT(x,n) (((x)<<(32-n))|((x)>>(n)))
  49. #define G(a,b,c,d,e) \
  50. v[a] += (m[sigma[i][e]] ^ cst[sigma[i][e+1]]) + v[b]; \
  51. v[d] = ROT(v[d] ^ v[a],16); \
  52. v[c] += v[d]; \
  53. v[b] = ROT(v[b] ^ v[c],12); \
  54. v[a] += (m[sigma[i][e+1]] ^ cst[sigma[i][e]])+v[b]; \
  55. v[d] = ROT(v[d] ^ v[a], 8); \
  56. v[c] += v[d]; \
  57. v[b] = ROT(v[b] ^ v[c], 7);
  58. for (i = 0; i < 16; ++i) m[i] = U8TO32(block + i * 4);
  59. for (i = 0; i < 8; ++i) v[i] = S->h[i];
  60. v[ 8] = S->s[0] ^ 0x243F6A88;
  61. v[ 9] = S->s[1] ^ 0x85A308D3;
  62. v[10] = S->s[2] ^ 0x13198A2E;
  63. v[11] = S->s[3] ^ 0x03707344;
  64. v[12] = 0xA4093822;
  65. v[13] = 0x299F31D0;
  66. v[14] = 0x082EFA98;
  67. v[15] = 0xEC4E6C89;
  68. if (S->nullt == 0) {
  69. v[12] ^= S->t[0];
  70. v[13] ^= S->t[0];
  71. v[14] ^= S->t[1];
  72. v[15] ^= S->t[1];
  73. }
  74. for (i = 0; i < 14; ++i) {
  75. G(0, 4, 8, 12, 0);
  76. G(1, 5, 9, 13, 2);
  77. G(2, 6, 10, 14, 4);
  78. G(3, 7, 11, 15, 6);
  79. G(3, 4, 9, 14, 14);
  80. G(2, 7, 8, 13, 12);
  81. G(0, 5, 10, 15, 8);
  82. G(1, 6, 11, 12, 10);
  83. }
  84. for (i = 0; i < 16; ++i) S->h[i % 8] ^= v[i];
  85. for (i = 0; i < 8; ++i) S->h[i] ^= S->s[i % 4];
  86. }
  87. void blake256_init(state *S) {
  88. S->h[0] = 0x6A09E667;
  89. S->h[1] = 0xBB67AE85;
  90. S->h[2] = 0x3C6EF372;
  91. S->h[3] = 0xA54FF53A;
  92. S->h[4] = 0x510E527F;
  93. S->h[5] = 0x9B05688C;
  94. S->h[6] = 0x1F83D9AB;
  95. S->h[7] = 0x5BE0CD19;
  96. S->t[0] = S->t[1] = S->buflen = S->nullt = 0;
  97. S->s[0] = S->s[1] = S->s[2] = S->s[3] = 0;
  98. }
  99. void blake224_init(state *S) {
  100. S->h[0] = 0xC1059ED8;
  101. S->h[1] = 0x367CD507;
  102. S->h[2] = 0x3070DD17;
  103. S->h[3] = 0xF70E5939;
  104. S->h[4] = 0xFFC00B31;
  105. S->h[5] = 0x68581511;
  106. S->h[6] = 0x64F98FA7;
  107. S->h[7] = 0xBEFA4FA4;
  108. S->t[0] = S->t[1] = S->buflen = S->nullt = 0;
  109. S->s[0] = S->s[1] = S->s[2] = S->s[3] = 0;
  110. }
  111. // datalen = number of bits
  112. void blake256_update(state *S, const uint8_t *data, uint64_t datalen) {
  113. int left = S->buflen >> 3;
  114. int fill = 64 - left;
  115. if (left && (((datalen >> 3) & 0x3F) >= (unsigned) fill)) {
  116. memcpy((void *) (S->buf + left), (void *) data, fill);
  117. S->t[0] += 512;
  118. if (S->t[0] == 0) S->t[1]++;
  119. blake256_compress(S, S->buf);
  120. data += fill;
  121. datalen -= (fill << 3);
  122. left = 0;
  123. }
  124. while (datalen >= 512) {
  125. S->t[0] += 512;
  126. if (S->t[0] == 0) S->t[1]++;
  127. blake256_compress(S, data);
  128. data += 64;
  129. datalen -= 512;
  130. }
  131. if (datalen > 0) {
  132. memcpy((void *) (S->buf + left), (void *) data, datalen >> 3);
  133. S->buflen = (left << 3) + datalen;
  134. } else {
  135. S->buflen = 0;
  136. }
  137. }
  138. // datalen = number of bits
  139. void blake224_update(state *S, const uint8_t *data, uint64_t datalen) {
  140. blake256_update(S, data, datalen);
  141. }
  142. void blake256_final_h(state *S, uint8_t *digest, uint8_t pa, uint8_t pb) {
  143. uint8_t msglen[8];
  144. uint32_t lo = S->t[0] + S->buflen, hi = S->t[1];
  145. if (lo < (unsigned) S->buflen) hi++;
  146. U32TO8(msglen + 0, hi);
  147. U32TO8(msglen + 4, lo);
  148. if (S->buflen == 440) { /* one padding byte */
  149. S->t[0] -= 8;
  150. blake256_update(S, &pa, 8);
  151. } else {
  152. if (S->buflen < 440) { /* enough space to fill the block */
  153. if (S->buflen == 0) S->nullt = 1;
  154. S->t[0] -= 440 - S->buflen;
  155. blake256_update(S, padding, 440 - S->buflen);
  156. } else { /* need 2 compressions */
  157. S->t[0] -= 512 - S->buflen;
  158. blake256_update(S, padding, 512 - S->buflen);
  159. S->t[0] -= 440;
  160. blake256_update(S, padding + 1, 440);
  161. S->nullt = 1;
  162. }
  163. blake256_update(S, &pb, 8);
  164. S->t[0] -= 8;
  165. }
  166. S->t[0] -= 64;
  167. blake256_update(S, msglen, 64);
  168. U32TO8(digest + 0, S->h[0]);
  169. U32TO8(digest + 4, S->h[1]);
  170. U32TO8(digest + 8, S->h[2]);
  171. U32TO8(digest + 12, S->h[3]);
  172. U32TO8(digest + 16, S->h[4]);
  173. U32TO8(digest + 20, S->h[5]);
  174. U32TO8(digest + 24, S->h[6]);
  175. U32TO8(digest + 28, S->h[7]);
  176. }
  177. void blake256_final(state *S, uint8_t *digest) {
  178. blake256_final_h(S, digest, 0x81, 0x01);
  179. }
  180. void blake224_final(state *S, uint8_t *digest) {
  181. blake256_final_h(S, digest, 0x80, 0x00);
  182. }
  183. // inlen = number of bytes
  184. void blake256_hash(uint8_t *out, const uint8_t *in, uint64_t inlen) {
  185. state S;
  186. blake256_init(&S);
  187. blake256_update(&S, in, inlen * 8);
  188. blake256_final(&S, out);
  189. }
  190. // inlen = number of bytes
  191. void blake224_hash(uint8_t *out, const uint8_t *in, uint64_t inlen) {
  192. state S;
  193. blake224_init(&S);
  194. blake224_update(&S, in, inlen * 8);
  195. blake224_final(&S, out);
  196. }
  197. // keylen = number of bytes
  198. void hmac_blake256_init(hmac_state *S, const uint8_t *_key, uint64_t keylen) {
  199. const uint8_t *key = _key;
  200. uint8_t keyhash[32];
  201. uint8_t pad[64];
  202. uint64_t i;
  203. if (keylen > 64) {
  204. blake256_hash(keyhash, key, keylen);
  205. key = keyhash;
  206. keylen = 32;
  207. }
  208. blake256_init(&S->inner);
  209. memset(pad, 0x36, 64);
  210. for (i = 0; i < keylen; ++i) {
  211. pad[i] ^= key[i];
  212. }
  213. blake256_update(&S->inner, pad, 512);
  214. blake256_init(&S->outer);
  215. memset(pad, 0x5c, 64);
  216. for (i = 0; i < keylen; ++i) {
  217. pad[i] ^= key[i];
  218. }
  219. blake256_update(&S->outer, pad, 512);
  220. memset(keyhash, 0, 32);
  221. }
  222. // keylen = number of bytes
  223. void hmac_blake224_init(hmac_state *S, const uint8_t *_key, uint64_t keylen) {
  224. const uint8_t *key = _key;
  225. uint8_t keyhash[32];
  226. uint8_t pad[64];
  227. uint64_t i;
  228. if (keylen > 64) {
  229. blake256_hash(keyhash, key, keylen);
  230. key = keyhash;
  231. keylen = 28;
  232. }
  233. blake224_init(&S->inner);
  234. memset(pad, 0x36, 64);
  235. for (i = 0; i < keylen; ++i) {
  236. pad[i] ^= key[i];
  237. }
  238. blake224_update(&S->inner, pad, 512);
  239. blake224_init(&S->outer);
  240. memset(pad, 0x5c, 64);
  241. for (i = 0; i < keylen; ++i) {
  242. pad[i] ^= key[i];
  243. }
  244. blake224_update(&S->outer, pad, 512);
  245. memset(keyhash, 0, 32);
  246. }
  247. // datalen = number of bits
  248. void hmac_blake256_update(hmac_state *S, const uint8_t *data, uint64_t datalen) {
  249. // update the inner state
  250. blake256_update(&S->inner, data, datalen);
  251. }
  252. // datalen = number of bits
  253. void hmac_blake224_update(hmac_state *S, const uint8_t *data, uint64_t datalen) {
  254. // update the inner state
  255. blake224_update(&S->inner, data, datalen);
  256. }
  257. void hmac_blake256_final(hmac_state *S, uint8_t *digest) {
  258. uint8_t ihash[32];
  259. blake256_final(&S->inner, ihash);
  260. blake256_update(&S->outer, ihash, 256);
  261. blake256_final(&S->outer, digest);
  262. memset(ihash, 0, 32);
  263. }
  264. void hmac_blake224_final(hmac_state *S, uint8_t *digest) {
  265. uint8_t ihash[32];
  266. blake224_final(&S->inner, ihash);
  267. blake224_update(&S->outer, ihash, 224);
  268. blake224_final(&S->outer, digest);
  269. memset(ihash, 0, 32);
  270. }
  271. // keylen = number of bytes; inlen = number of bytes
  272. void hmac_blake256_hash(uint8_t *out, const uint8_t *key, uint64_t keylen, const uint8_t *in, uint64_t inlen) {
  273. hmac_state S;
  274. hmac_blake256_init(&S, key, keylen);
  275. hmac_blake256_update(&S, in, inlen * 8);
  276. hmac_blake256_final(&S, out);
  277. }
  278. // keylen = number of bytes; inlen = number of bytes
  279. void hmac_blake224_hash(uint8_t *out, const uint8_t *key, uint64_t keylen, const uint8_t *in, uint64_t inlen) {
  280. hmac_state S;
  281. hmac_blake224_init(&S, key, keylen);
  282. hmac_blake224_update(&S, in, inlen * 8);
  283. hmac_blake224_final(&S, out);
  284. }