| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
|
|
|
|
|
|
/* blake2b.c - an implementation of blake2b hash function. |
|
2
|
|
|
|
|
|
|
* |
|
3
|
|
|
|
|
|
|
* Copyright (c) 2012, Samuel Neves |
|
4
|
|
|
|
|
|
|
* Copyright (c) 2021, Aleksey Kravchenko |
|
5
|
|
|
|
|
|
|
* |
|
6
|
|
|
|
|
|
|
* Permission to use, copy, modify, and/or distribute this software for any |
|
7
|
|
|
|
|
|
|
* purpose with or without fee is hereby granted. |
|
8
|
|
|
|
|
|
|
* |
|
9
|
|
|
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH |
|
10
|
|
|
|
|
|
|
* REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY |
|
11
|
|
|
|
|
|
|
* AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, |
|
12
|
|
|
|
|
|
|
* INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM |
|
13
|
|
|
|
|
|
|
* LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE |
|
14
|
|
|
|
|
|
|
* OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR |
|
15
|
|
|
|
|
|
|
* PERFORMANCE OF THIS SOFTWARE. |
|
16
|
|
|
|
|
|
|
*/ |
|
17
|
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
#include "blake2b.h" |
|
19
|
|
|
|
|
|
|
#include "byte_order.h" |
|
20
|
|
|
|
|
|
|
#include |
|
21
|
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
static const uint64_t blake2b_IV[8] = |
|
23
|
|
|
|
|
|
|
{ |
|
24
|
|
|
|
|
|
|
I64(0x6a09e667f3bcc908), I64(0xbb67ae8584caa73b), |
|
25
|
|
|
|
|
|
|
I64(0x3c6ef372fe94f82b), I64(0xa54ff53a5f1d36f1), |
|
26
|
|
|
|
|
|
|
I64(0x510e527fade682d1), I64(0x9b05688c2b3e6c1f), |
|
27
|
|
|
|
|
|
|
I64(0x1f83d9abfb41bd6b), I64(0x5be0cd19137e2179) |
|
28
|
|
|
|
|
|
|
}; |
|
29
|
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
static const uint8_t blake2b_sigma[12][16] = |
|
31
|
|
|
|
|
|
|
{ |
|
32
|
|
|
|
|
|
|
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 }, |
|
33
|
|
|
|
|
|
|
{ 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 }, |
|
34
|
|
|
|
|
|
|
{ 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 }, |
|
35
|
|
|
|
|
|
|
{ 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 }, |
|
36
|
|
|
|
|
|
|
{ 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 }, |
|
37
|
|
|
|
|
|
|
{ 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 }, |
|
38
|
|
|
|
|
|
|
{ 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 }, |
|
39
|
|
|
|
|
|
|
{ 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 }, |
|
40
|
|
|
|
|
|
|
{ 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 }, |
|
41
|
|
|
|
|
|
|
{ 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13, 0 }, |
|
42
|
|
|
|
|
|
|
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 }, |
|
43
|
|
|
|
|
|
|
{ 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } |
|
44
|
|
|
|
|
|
|
}; |
|
45
|
|
|
|
|
|
|
|
|
46
|
2
|
|
|
|
|
|
void rhash_blake2b_init(blake2b_ctx* ctx) |
|
47
|
|
|
|
|
|
|
{ |
|
48
|
2
|
|
|
|
|
|
memset(ctx, 0, sizeof(*ctx)); |
|
49
|
|
|
|
|
|
|
/* init state by xoring IV with blake2b input parameter block */ |
|
50
|
2
|
|
|
|
|
|
ctx->hash[0] = blake2b_IV[0] ^ I64(0x01010040); |
|
51
|
2
|
|
|
|
|
|
ctx->hash[1] = blake2b_IV[1]; |
|
52
|
2
|
|
|
|
|
|
ctx->hash[2] = blake2b_IV[2]; |
|
53
|
2
|
|
|
|
|
|
ctx->hash[3] = blake2b_IV[3]; |
|
54
|
2
|
|
|
|
|
|
ctx->hash[4] = blake2b_IV[4]; |
|
55
|
2
|
|
|
|
|
|
ctx->hash[5] = blake2b_IV[5]; |
|
56
|
2
|
|
|
|
|
|
ctx->hash[6] = blake2b_IV[6]; |
|
57
|
2
|
|
|
|
|
|
ctx->hash[7] = blake2b_IV[7]; |
|
58
|
2
|
|
|
|
|
|
} |
|
59
|
|
|
|
|
|
|
|
|
60
|
|
|
|
|
|
|
#define G(r,i,a,b,c,d) \ |
|
61
|
|
|
|
|
|
|
do { \ |
|
62
|
|
|
|
|
|
|
a = a + b + m[blake2b_sigma[r][2*i+0]]; \ |
|
63
|
|
|
|
|
|
|
d = ROTR64(d ^ a, 32); \ |
|
64
|
|
|
|
|
|
|
c = c + d; \ |
|
65
|
|
|
|
|
|
|
b = ROTR64(b ^ c, 24); \ |
|
66
|
|
|
|
|
|
|
a = a + b + m[blake2b_sigma[r][2*i+1]]; \ |
|
67
|
|
|
|
|
|
|
d = ROTR64(d ^ a, 16); \ |
|
68
|
|
|
|
|
|
|
c = c + d; \ |
|
69
|
|
|
|
|
|
|
b = ROTR64(b ^ c, 63); \ |
|
70
|
|
|
|
|
|
|
} while(0) |
|
71
|
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
#define ROUND(r) \ |
|
73
|
|
|
|
|
|
|
do { \ |
|
74
|
|
|
|
|
|
|
G(r,0,v[0],v[4],v[ 8],v[12]); \ |
|
75
|
|
|
|
|
|
|
G(r,1,v[1],v[5],v[ 9],v[13]); \ |
|
76
|
|
|
|
|
|
|
G(r,2,v[2],v[6],v[10],v[14]); \ |
|
77
|
|
|
|
|
|
|
G(r,3,v[3],v[7],v[11],v[15]); \ |
|
78
|
|
|
|
|
|
|
G(r,4,v[0],v[5],v[10],v[15]); \ |
|
79
|
|
|
|
|
|
|
G(r,5,v[1],v[6],v[11],v[12]); \ |
|
80
|
|
|
|
|
|
|
G(r,6,v[2],v[7],v[ 8],v[13]); \ |
|
81
|
|
|
|
|
|
|
G(r,7,v[3],v[4],v[ 9],v[14]); \ |
|
82
|
|
|
|
|
|
|
} while(0) |
|
83
|
|
|
|
|
|
|
|
|
84
|
2
|
|
|
|
|
|
static void rhash_blake2b_process_block(blake2b_ctx* ctx, const uint64_t* m, uint64_t finalization_flag) |
|
85
|
|
|
|
|
|
|
{ |
|
86
|
|
|
|
|
|
|
uint64_t v[16]; |
|
87
|
|
|
|
|
|
|
size_t i; |
|
88
|
|
|
|
|
|
|
|
|
89
|
2
|
|
|
|
|
|
memcpy(v, ctx->hash, sizeof(uint64_t) * 8); |
|
90
|
2
|
|
|
|
|
|
v[ 8] = blake2b_IV[0]; |
|
91
|
2
|
|
|
|
|
|
v[ 9] = blake2b_IV[1]; |
|
92
|
2
|
|
|
|
|
|
v[10] = blake2b_IV[2]; |
|
93
|
2
|
|
|
|
|
|
v[11] = blake2b_IV[3]; |
|
94
|
2
|
|
|
|
|
|
v[12] = blake2b_IV[4] ^ ctx->length; // length correction |
|
95
|
2
|
|
|
|
|
|
v[13] = blake2b_IV[5]; |
|
96
|
2
|
|
|
|
|
|
v[14] = blake2b_IV[6] ^ finalization_flag; |
|
97
|
2
|
|
|
|
|
|
v[15] = blake2b_IV[7]; |
|
98
|
|
|
|
|
|
|
|
|
99
|
2
|
|
|
|
|
|
ROUND(0); |
|
100
|
2
|
|
|
|
|
|
ROUND(1); |
|
101
|
2
|
|
|
|
|
|
ROUND(2); |
|
102
|
2
|
|
|
|
|
|
ROUND(3); |
|
103
|
2
|
|
|
|
|
|
ROUND(4); |
|
104
|
2
|
|
|
|
|
|
ROUND(5); |
|
105
|
2
|
|
|
|
|
|
ROUND(6); |
|
106
|
2
|
|
|
|
|
|
ROUND(7); |
|
107
|
2
|
|
|
|
|
|
ROUND(8); |
|
108
|
2
|
|
|
|
|
|
ROUND(9); |
|
109
|
2
|
|
|
|
|
|
ROUND(10); |
|
110
|
2
|
|
|
|
|
|
ROUND(11); |
|
111
|
|
|
|
|
|
|
|
|
112
|
18
|
100
|
|
|
|
|
for(i = 0; i < 8; ++i) |
|
113
|
16
|
|
|
|
|
|
ctx->hash[i] ^= v[i] ^ v[i + 8]; |
|
114
|
2
|
|
|
|
|
|
} |
|
115
|
|
|
|
|
|
|
|
|
116
|
2
|
|
|
|
|
|
void rhash_blake2b_update(blake2b_ctx* ctx, const unsigned char* msg, size_t size) |
|
117
|
|
|
|
|
|
|
{ |
|
118
|
2
|
50
|
|
|
|
|
if(size > 0) |
|
119
|
|
|
|
|
|
|
{ |
|
120
|
2
|
|
|
|
|
|
size_t index = (size_t)ctx->length & 127; |
|
121
|
2
|
50
|
|
|
|
|
if(index) |
|
122
|
|
|
|
|
|
|
{ |
|
123
|
0
|
|
|
|
|
|
size_t rest = blake2b_block_size - index; |
|
124
|
0
|
0
|
|
|
|
|
if (size > rest) { |
|
125
|
0
|
|
|
|
|
|
le64_copy(ctx->message, index, msg, rest); /* fill the block */ |
|
126
|
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
/* process the block */ |
|
128
|
0
|
|
|
|
|
|
size -= rest; |
|
129
|
0
|
|
|
|
|
|
msg += rest; |
|
130
|
0
|
|
|
|
|
|
ctx->length += rest; |
|
131
|
0
|
|
|
|
|
|
index = 0; |
|
132
|
0
|
|
|
|
|
|
rhash_blake2b_process_block(ctx, ctx->message, I64(0)); |
|
133
|
|
|
|
|
|
|
} |
|
134
|
2
|
50
|
|
|
|
|
} else if (ctx->length) { |
|
135
|
0
|
|
|
|
|
|
rhash_blake2b_process_block(ctx, ctx->message, I64(0)); |
|
136
|
|
|
|
|
|
|
} |
|
137
|
2
|
50
|
|
|
|
|
while(size > blake2b_block_size) { |
|
138
|
|
|
|
|
|
|
uint64_t* aligned_message_block; |
|
139
|
0
|
0
|
|
|
|
|
if (IS_LITTLE_ENDIAN && IS_ALIGNED_64(msg)) { |
|
140
|
0
|
|
|
|
|
|
aligned_message_block = (uint64_t*)msg; |
|
141
|
|
|
|
|
|
|
} else { |
|
142
|
0
|
|
|
|
|
|
le64_copy(ctx->message, 0, msg, blake2b_block_size); |
|
143
|
0
|
|
|
|
|
|
aligned_message_block = ctx->message; |
|
144
|
|
|
|
|
|
|
} |
|
145
|
0
|
|
|
|
|
|
size -= blake2b_block_size; |
|
146
|
0
|
|
|
|
|
|
msg += blake2b_block_size; |
|
147
|
0
|
|
|
|
|
|
ctx->length += blake2b_block_size; |
|
148
|
0
|
|
|
|
|
|
rhash_blake2b_process_block(ctx, aligned_message_block, I64(0)); |
|
149
|
|
|
|
|
|
|
} |
|
150
|
2
|
|
|
|
|
|
le64_copy(ctx->message, index, msg, size); /* save leftovers */ |
|
151
|
2
|
|
|
|
|
|
ctx->length += size; |
|
152
|
|
|
|
|
|
|
} |
|
153
|
2
|
|
|
|
|
|
} |
|
154
|
|
|
|
|
|
|
|
|
155
|
2
|
|
|
|
|
|
void rhash_blake2b_final(blake2b_ctx* ctx, unsigned char *result) |
|
156
|
|
|
|
|
|
|
{ |
|
157
|
2
|
|
|
|
|
|
size_t length = (size_t)ctx->length & 127; |
|
158
|
2
|
50
|
|
|
|
|
if (length) |
|
159
|
|
|
|
|
|
|
{ |
|
160
|
|
|
|
|
|
|
/* pad the message with zeros */ |
|
161
|
2
|
|
|
|
|
|
size_t index = length >> 3; |
|
162
|
2
|
|
|
|
|
|
size_t shift = (length & 7) * 8; |
|
163
|
2
|
|
|
|
|
|
ctx->message[index] &= ~(I64(0xFFFFFFFFFFFFFFFF) << shift); |
|
164
|
32
|
100
|
|
|
|
|
for(index++; index < 16; index++) |
|
165
|
30
|
|
|
|
|
|
ctx->message[index] = 0; |
|
166
|
|
|
|
|
|
|
} |
|
167
|
2
|
|
|
|
|
|
rhash_blake2b_process_block(ctx, ctx->message, I64(0xFFFFFFFFFFFFFFFF)); |
|
168
|
|
|
|
|
|
|
|
|
169
|
|
|
|
|
|
|
/* convert hash state to result bytes */ |
|
170
|
2
|
|
|
|
|
|
le64_copy(result, 0, ctx->hash, blake2b_hash_size); |
|
171
|
2
|
|
|
|
|
|
} |