]> git.cryptolib.org Git - avr-crypto-lib.git/blob - blake/blake_large.c
fixing blake & adding testvectors
[avr-crypto-lib.git] / blake / blake_large.c
1 /* blake_large.c */
2 /*
3     This file is part of the AVR-Crypto-Lib.
4     Copyright (C) 2009  Daniel Otte (daniel.otte@rub.de)
5
6     This program is free software: you can redistribute it and/or modify
7     it under the terms of the GNU General Public License as published by
8     the Free Software Foundation, either version 3 of the License, or
9     (at your option) any later version.
10
11     This program is distributed in the hope that it will be useful,
12     but WITHOUT ANY WARRANTY; without even the implied warranty of
13     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14     GNU General Public License for more details.
15
16     You should have received a copy of the GNU General Public License
17     along with this program.  If not, see <http://www.gnu.org/licenses/>.
18 */
19 /*
20  * \file    blake_large.c
21  * \author  Daniel Otte
22  * \email   daniel.otte@rub.de
23  * \date    2009-05-08
24  * \license GPLv3 or later
25  *
26  */
27
28 #include <stdint.h>
29 #include <string.h>
30 #include <avr/pgmspace.h>
31 #include "memxor.h"
32 #include "blake_large.h"
33 #include "blake_common.h"
34
35 #include "cli.h"
36
37 #define BUG_3 0 /* bug compatibility with reference code */
38 #define BUG_4 0 /* bug compatibility with reference code */
39
40 uint64_t pgm_read_qword(void* p){
41         union{
42                 uint64_t v64;
43                 uint32_t v32[2];
44         }r;
45         r.v32[0] = pgm_read_dword(p);
46         r.v32[1] = pgm_read_dword((uint8_t*)p+4);
47         return r.v64;
48 }
49
50 static
51 uint64_t blake_c[] PROGMEM = {
52    0x243F6A8885A308D3LL, 0x13198A2E03707344LL,
53    0xA4093822299F31D0LL, 0x082EFA98EC4E6C89LL,
54    0x452821E638D01377LL, 0xBE5466CF34E90C6CLL,
55    0xC0AC29B7C97C50DDLL, 0x3F84D5B5B5470917LL,
56    0x9216D5D98979FB1BLL, 0xD1310BA698DFB5ACLL,
57    0x2FFD72DBD01ADFB7LL, 0xB8E1AFED6A267E96LL,
58    0xBA7C9045F12C7F99LL, 0x24A19947B3916CF7LL,
59    0x0801F2E2858EFC16LL, 0x636920D871574E69LL
60 };
61
62
63
64 #define ROTL64(a, n) (((a)<<(n))|((a)>>(64-(n))))
65 #define ROTR64(a, n) (((a)>>(n))|((a)<<(64-(n))))
66 #define CHANGE_ENDIAN32(a) (((a)<<24)| \
67                             ((0x0000ff00&(a))<<8)| \
68                                                     ((0x00ff0000&(a))>>8)| \
69                                                     (a)>>24 )
70
71 void blake_large_expand(uint64_t* v, const blake_large_ctx_t* ctx){
72         uint8_t i;
73         memcpy(v, ctx->h, 8*8);
74         for(i=0; i<8; ++i){
75                 v[8+i] = pgm_read_qword(&(blake_c[i]));
76         }
77         memxor((uint8_t*)v+8, ctx->s, 4*8);
78
79 }
80
81 void blake_large_changeendian(void* dest, const void* src){
82         uint8_t i;
83         uint32_t tmp;
84         for(i=0; i<32; i+=2){
85                 tmp = CHANGE_ENDIAN32(((uint32_t*)src)[i]);
86                 ((uint32_t*)dest)[i] = CHANGE_ENDIAN32(((uint32_t*)src)[i+1]);
87                 ((uint32_t*)dest)[i+1] = tmp;
88         }
89 }
90
91 void blake_large_compress(uint64_t* v,const void* m){
92         uint8_t r,i;
93         uint8_t a,b,c,d, s0, s1;
94 //      cli_putstr_P(PSTR("\r\nblock:"));
95 //      cli_hexdump_block(m, 128, 5, 8);
96         for(r=0; r<14; ++r){
97                 for(i=0; i<8; ++i){
98         //              blake_large_g(r%10, i, v, (uint64_t*)m);
99                         a = pgm_read_byte(blake_index_lut+4*i+0);
100                         b = pgm_read_byte(blake_index_lut+4*i+1);
101                         c = pgm_read_byte(blake_index_lut+4*i+2);
102                         d = pgm_read_byte(blake_index_lut+4*i+3);
103                         s0 = pgm_read_byte(blake_sigma+16*r+2*i+0);
104                         s1 = pgm_read_byte(blake_sigma+16*r+2*i+1);
105                         v[a] += v[b] + (((uint64_t*)m)[s0] ^ pgm_read_qword(&(blake_c[s1])));
106                         v[d]  = ROTR64(v[d]^v[a], 32);
107                         v[c] += v[d];
108                         v[b]  = ROTR64(v[b]^v[c], 25);
109                         v[a] += v[b] + (((uint64_t*)m)[s1] ^ pgm_read_qword(&(blake_c[s0])));
110                         v[d]  = ROTR64(v[d]^v[a], 16);
111                         v[c] += v[d];
112                         v[b]  = ROTR64(v[b]^v[c], 11);
113                 }
114 /*
115                 cli_putstr_P(PSTR("\r\nv:"));
116                 for(i=0; i<16; ++i){
117                         if(i%4==0)
118                                 cli_putstr_P(PSTR("\r\n    "));
119                         cli_hexdump_rev(&(v[i]), 8);
120                         cli_putc(' ');
121                 }
122 */
123         }
124 }
125
126 void blake_large_collapse(blake_large_ctx_t* ctx, uint64_t* v){
127         uint8_t i;
128         for(i=0; i<8; ++i){
129                 ctx->h[i] ^= ctx->s[i%4] ^ v[i] ^ v[8+i];
130         }
131 }
132
133 void blake_large_nextBlock(blake_large_ctx_t* ctx, const void* msg){
134         uint64_t v[16];
135         uint64_t m[16];
136         union {
137                 uint64_t v64;
138                 uint32_t v32[2];
139         }ctr;
140         blake_large_expand(v,ctx);
141         ctx->counter++;
142         ctr.v64 = ctx->counter*1024;
143         v[12] ^= ctr.v64;
144         v[13] ^= ctr.v64;
145         blake_large_changeendian(m, msg);
146         blake_large_compress(v, m);
147         blake_large_collapse(ctx, v);
148 }
149
150 void blake_large_lastBlock(blake_large_ctx_t* ctx, const void* msg, uint16_t length_b){
151         while(length_b>=BLAKE_LARGE_BLOCKSIZE){
152                 blake_large_nextBlock(ctx, msg);
153                 msg = (uint8_t*)msg + BLAKE_LARGE_BLOCKSIZE_B;
154                 length_b -= BLAKE_LARGE_BLOCKSIZE;
155         }
156         uint8_t buffer[128];
157         uint64_t v[16];
158         uint64_t ctr;
159         ctr = ctx->counter*1024+length_b;
160         memset(buffer, 0, 128);
161         memcpy(buffer, msg, (length_b+7)/8);
162         buffer[length_b/8] |= 0x80 >> (length_b&0x7);
163         blake_large_changeendian(buffer, buffer);
164         blake_large_expand(v, ctx);
165 #if BUG_3
166         uint8_t x=0;
167         if(length_b%1024<895 && length_b%8)
168                 x=0x40;
169         v[12] ^= ctr + x;
170         v[13] ^= ctr + x;
171
172 #else
173         if(length_b){
174                 v[12] ^= ctr;
175                 v[13] ^= ctr;
176         }
177 #endif
178         if(length_b>1024-128-2){
179 #if BUG_4
180                 if(length_b<1017){
181                         blake_large_compress(v, buffer);
182                         blake_large_collapse(ctx, v);
183                 }
184 #else
185                 blake_large_compress(v, buffer);
186                 blake_large_collapse(ctx, v);
187 #endif
188                 memset(buffer, 0, 128-8);
189                 blake_large_expand(v, ctx);
190         }
191         if(ctx->appendone)
192                 buffer[128-16-8] |= 0x01;
193         *((uint64_t*)(&(buffer[128-8]))) = ctr;
194         blake_large_compress(v, buffer);
195         blake_large_collapse(ctx, v);
196
197 }
198
199 uint64_t blake64_iv[] PROGMEM = {
200     0x6A09E667F3BCC908LL, 0xBB67AE8584CAA73BLL,
201     0x3C6EF372FE94F82BLL, 0xA54FF53A5F1D36F1LL,
202     0x510E527FADE682D1LL, 0x9B05688C2B3E6C1FLL,
203     0x1F83D9ABFB41BD6BLL, 0x5BE0CD19137E2179LL
204 };
205
206 void blake64_init(blake64_ctx_t* ctx){
207         uint8_t i;
208         for(i=0; i<8; ++i){
209                 ctx->h[i] = pgm_read_qword(&(blake64_iv[i]));
210         }
211         memset(ctx->s, 0, 4*8);
212         ctx->counter = 0;
213         ctx->appendone = 1;
214 }
215
216 uint64_t blake48_iv[] PROGMEM = {
217     0xCBBB9D5DC1059ED8LL, 0x629A292A367CD507LL,
218     0x9159015A3070DD17LL, 0x152FECD8F70E5939LL,
219     0x67332667FFC00B31LL, 0x8EB44A8768581511LL,
220     0xDB0C2E0D64F98FA7LL, 0x47B5481DBEFA4FA4LL
221 };
222
223 void blake48_init(blake48_ctx_t* ctx){
224         uint8_t i;
225         for(i=0; i<8; ++i){
226                 ctx->h[i] = pgm_read_qword(&(blake48_iv[i]));
227         }
228         memset(ctx->s, 0, 4*8);
229         ctx->counter = 0;
230         ctx->appendone = 0;
231 }
232
233 void blake64_ctx2hash(void* dest, const blake64_ctx_t* ctx){
234         uint8_t i;
235         for(i=0; i<8; ++i){
236                 ((uint32_t*)dest)[2*i+0] = CHANGE_ENDIAN32((ctx->h[i])>>32);
237                 ((uint32_t*)dest)[2*i+1] = CHANGE_ENDIAN32((uint32_t)ctx->h[i]);
238         }
239 }
240
241 void blake48_ctx2hash(void* dest, const blake48_ctx_t* ctx){
242         uint8_t i;
243         for(i=0; i<6; ++i){
244                 ((uint32_t*)dest)[2*i+0] = CHANGE_ENDIAN32((ctx->h[i])>>32);
245                 ((uint32_t*)dest)[2*i+1] = CHANGE_ENDIAN32((uint32_t)ctx->h[i]);
246         }
247 }
248
249 void blake64_nextBlock(blake64_ctx_t* ctx, const void* block){
250         blake_large_nextBlock(ctx, block);
251 }
252
253 void blake48_nextBlock(blake48_ctx_t* ctx, const void* block){
254         blake_large_nextBlock(ctx, block);
255 }
256
257 void blake64_lastBlock(blake64_ctx_t* ctx, const void* block, uint16_t length_b){
258         blake_large_lastBlock(ctx, block, length_b);
259 }
260
261 void blake48_lastBlock(blake48_ctx_t* ctx, const void* block, uint16_t length_b){
262         blake_large_lastBlock(ctx, block, length_b);
263 }
264
265 void blake64(void* dest, const void* msg, uint32_t length_b){
266         blake_large_ctx_t ctx;
267         blake64_init(&ctx);
268         while(length_b>=BLAKE_LARGE_BLOCKSIZE){
269                 blake_large_nextBlock(&ctx, msg);
270                 msg = (uint8_t*)msg + BLAKE_LARGE_BLOCKSIZE_B;
271                 length_b -= BLAKE_LARGE_BLOCKSIZE;
272         }
273         blake_large_lastBlock(&ctx, msg, length_b);
274         blake64_ctx2hash(dest, &ctx);
275 }
276
277 void blake48(void* dest, const void* msg, uint32_t length_b){
278         blake_large_ctx_t ctx;
279         blake48_init(&ctx);
280         while(length_b>=BLAKE_LARGE_BLOCKSIZE){
281                 blake_large_nextBlock(&ctx, msg);
282                 msg = (uint8_t*)msg + BLAKE_LARGE_BLOCKSIZE_B;
283                 length_b -= BLAKE_LARGE_BLOCKSIZE;
284         }
285         blake_large_lastBlock(&ctx, msg, length_b);
286         blake48_ctx2hash(dest, &ctx);
287 }