]> git.cryptolib.org Git - avr-crypto-lib.git/blob - blake/blake_small.c
9467b04e622641ee49e0b83fbe185a9ef94810e4
[avr-crypto-lib.git] / blake / blake_small.c
1 /* blake_small.c */
2 /*
3     This file is part of the AVR-Crypto-Lib.
4     Copyright (C) 2009  Daniel Otte (daniel.otte@rub.de)
5
6     This program is free software: you can redistribute it and/or modify
7     it under the terms of the GNU General Public License as published by
8     the Free Software Foundation, either version 3 of the License, or
9     (at your option) any later version.
10
11     This program is distributed in the hope that it will be useful,
12     but WITHOUT ANY WARRANTY; without even the implied warranty of
13     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14     GNU General Public License for more details.
15
16     You should have received a copy of the GNU General Public License
17     along with this program.  If not, see <http://www.gnu.org/licenses/>.
18 */
19 /*
20  * \file    blake_small.c
21  * \author  Daniel Otte
22  * \email   daniel.otte@rub.de
23  * \date    2009-05-04
24  * \license GPLv3 or later
25  *
26  */
27
28 #include <stdint.h>
29 #include <string.h>
30 #include <avr/pgmspace.h>
31 #include "memxor.h"
32 #include "blake_small.h"
33 #include "blake_common.h"
34
35 static
36 const uint32_t blake_c[] PROGMEM = {
37    0x243F6A88, 0x85A308D3,
38    0x13198A2E, 0x03707344,
39    0xA4093822, 0x299F31D0,
40    0x082EFA98, 0xEC4E6C89,
41    0x452821E6, 0x38D01377,
42    0xBE5466CF, 0x34E90C6C,
43    0xC0AC29B7, 0xC97C50DD,
44    0x3F84D5B5, 0xB5470917
45 };
46
47 #define ROTL32(a, n) (((a)<<(n))|((a)>>(32-(n))))
48 #define ROTR32(a, n) (((a)>>(n))|((a)<<(32-(n))))
49 #define CHANGE_ENDIAN32(a) (((a)<<24)| \
50                             ((0x0000ff00&(a))<<8)| \
51                                                     ((0x00ff0000&(a))>>8)| \
52                                                     (a)>>24 )
53 static
54 void blake_small_expand(uint32_t *v, const blake_small_ctx_t *ctx){
55         uint8_t i;
56         memcpy(v, ctx->h, 8*4);
57         for(i=0; i<8; ++i){
58                 v[8+i] = pgm_read_dword(&(blake_c[i]));
59         }
60         memxor((uint8_t*)v+8, ctx->s, 4*4);
61
62 }
63
64 static
65 void blake_small_changeendian(void *dest, const void *src){
66         uint8_t i;
67         for(i=0; i<16; ++i){
68                 ((uint32_t*)dest)[i] = CHANGE_ENDIAN32(((uint32_t*)src)[i]);
69         }
70 }
71
72 static
73 void blake_small_compress(uint32_t *v,const void *m){
74         uint8_t r,i;
75         uint8_t a,b,c,d, s0, s1, sigma_idx=0;
76         uint32_t lv[4];
77         for(r=0; r<14; ++r){
78                 for(i=0; i<8; ++i){
79                         a = pgm_read_byte(blake_index_lut+4*i+0);
80                         b = pgm_read_byte(blake_index_lut+4*i+1);
81                         c = pgm_read_byte(blake_index_lut+4*i+2);
82                         d = pgm_read_byte(blake_index_lut+4*i+3);
83                         s0 = pgm_read_byte(blake_sigma+sigma_idx);
84                         s1 = s0&0xf;
85                         s0 >>= 4;++sigma_idx;
86                         if(sigma_idx>=80){
87                                 sigma_idx-=80;
88                         }
89                         lv[0] = v[a];
90                         lv[1] = v[b];
91                         lv[2] = v[c];
92                         lv[3] = v[d];
93
94                         lv[0] += lv[1] + (((uint32_t*)m)[s0] ^ pgm_read_dword(&(blake_c[s1])));
95                         lv[3]  = ROTR32(lv[3]^lv[0], 16);
96                         lv[2] += lv[3];
97                         lv[1]  = ROTR32(lv[1]^lv[2], 12);
98                         lv[0] += lv[1] + (((uint32_t*)m)[s1] ^ pgm_read_dword(&(blake_c[s0])));
99                         lv[3]  = ROTR32(lv[3]^lv[0], 8);
100                         lv[2] += lv[3];
101                         lv[1]  = ROTR32(lv[1]^lv[2], 7);
102
103                         v[a] = lv[0];
104                         v[b] = lv[1];
105                         v[c] = lv[2];
106                         v[d] = lv[3];
107                 }
108         }
109 }
110
111 static
112 void blake_small_collapse(blake_small_ctx_t *ctx, uint32_t *v){
113         uint8_t i;
114         for(i=0; i<8; ++i){
115                 ctx->h[i] ^= ctx->s[i%4] ^ v[i] ^ v[8+i];
116         }
117 }
118
119 void blake_small_nextBlock(blake_small_ctx_t *ctx, const void *msg){
120         uint32_t v[16];
121         uint32_t m[16];
122         union {
123                 uint64_t v64;
124                 uint32_t v32[2];
125         }ctr;
126         blake_small_expand(v,ctx);
127         ctx->counter++;
128         ctr.v64 = ctx->counter*512;
129         v[12] ^= ctr.v32[0];
130         v[13] ^= ctr.v32[0];
131         v[14] ^= ctr.v32[1];
132         v[15] ^= ctr.v32[1];
133         blake_small_changeendian(m, msg);
134         blake_small_compress(v, m);
135         blake_small_collapse(ctx, v);
136 }
137
138 void blake_small_lastBlock(blake_small_ctx_t *ctx, const void *msg, uint16_t length_b){
139         while(length_b>=BLAKE_SMALL_BLOCKSIZE){
140                 blake_small_nextBlock(ctx, msg);
141                 msg = (uint8_t*)msg + BLAKE_SMALL_BLOCKSIZE_B;
142                 length_b -= BLAKE_SMALL_BLOCKSIZE;
143         }
144         union {
145                 uint8_t   v8[64];
146                 uint32_t v32[16];
147         } buffer;
148         uint32_t v[16];
149         union {
150                 uint64_t v64;
151                 uint32_t v32[2];
152         }ctr;
153         ctr.v64 = ctx->counter*512+length_b;
154         memset(buffer.v8, 0, 64);
155         memcpy(buffer.v8, msg, (length_b+7)/8);
156         buffer.v8[length_b/8] |= 0x80 >> (length_b&0x7);
157         blake_small_changeendian(buffer.v8, buffer.v8);
158         blake_small_expand(v, ctx);
159         if(length_b>512-64-2){
160                 v[12] ^= ctr.v32[0];
161                 v[13] ^= ctr.v32[0];
162                 v[14] ^= ctr.v32[1];
163                 v[15] ^= ctr.v32[1];
164                 blake_small_compress(v, buffer.v8);
165                 blake_small_collapse(ctx, v);
166                 memset(buffer.v8, 0, 64-8);
167                 blake_small_expand(v, ctx);
168         }else{
169                 if(length_b){
170                         v[12] ^= ctr.v32[0];
171                         v[13] ^= ctr.v32[0];
172                         v[14] ^= ctr.v32[1];
173                         v[15] ^= ctr.v32[1];
174                 }
175         }
176         if(ctx->appendone)
177                 buffer.v8[64-8-4] |= 0x01;
178         buffer.v32[14] = ctr.v32[1];
179         buffer.v32[15] = ctr.v32[0];
180         blake_small_compress(v, buffer.v8);
181         blake_small_collapse(ctx, v);
182
183 }
184
185 const uint32_t blake256_iv[] PROGMEM = {
186         0x6A09E667L, 0xBB67AE85,
187         0x3C6EF372L, 0xA54FF53A,
188         0x510E527FL, 0x9B05688C,
189         0x1F83D9ABL, 0x5BE0CD19
190 };
191
192 void blake256_init(blake256_ctx_t *ctx){
193         uint8_t i;
194         for(i=0; i<8; ++i){
195                 ctx->h[i] = pgm_read_dword(&(blake256_iv[i]));
196         }
197         memset(ctx->s, 0, 4*4);
198         ctx->counter = 0;
199         ctx->appendone = 1;
200 }
201
202 const uint32_t blake224_iv[] PROGMEM = {
203         0xC1059ED8, 0x367CD507,
204         0x3070DD17, 0xF70E5939,
205         0xFFC00B31, 0x68581511,
206         0x64F98FA7, 0xBEFA4FA4
207 };
208
209 void blake224_init(blake224_ctx_t *ctx){
210         uint8_t i;
211         for(i=0; i<8; ++i){
212                 ctx->h[i] = pgm_read_dword(&(blake224_iv[i]));
213         }
214         memset(ctx->s, 0, 4*4);
215         ctx->counter = 0;
216         ctx->appendone = 0;
217 }
218
219 void blake256_ctx2hash(void *dest, const blake256_ctx_t *ctx){
220         uint8_t i;
221         for(i=0; i<8; ++i){
222                 ((uint32_t*)dest)[i] = CHANGE_ENDIAN32(ctx->h[i]);
223         }
224 }
225
226 void blake224_ctx2hash(void *dest, const blake224_ctx_t *ctx){
227         uint8_t i;
228         for(i=0; i<7; ++i){
229                 ((uint32_t*)dest)[i] = CHANGE_ENDIAN32(ctx->h[i]);
230         }
231 }
232
233 void blake256_nextBlock(blake256_ctx_t *ctx, const void *block){
234         blake_small_nextBlock(ctx, block);
235 }
236
237 void blake224_nextBlock(blake224_ctx_t *ctx, const void *block){
238         blake_small_nextBlock(ctx, block);
239 }
240
241 void blake256_lastBlock(blake256_ctx_t *ctx, const void *block, uint16_t length_b){
242         blake_small_lastBlock(ctx, block, length_b);
243 }
244
245 void blake224_lastBlock(blake224_ctx_t *ctx, const void *block, uint16_t length_b){
246         blake_small_lastBlock(ctx, block, length_b);
247 }
248
249 void blake256(void *dest, const void *msg, uint32_t length_b){
250         blake_small_ctx_t ctx;
251         blake256_init(&ctx);
252         while(length_b>=BLAKE_SMALL_BLOCKSIZE){
253                 blake_small_nextBlock(&ctx, msg);
254                 msg = (uint8_t*)msg + BLAKE_SMALL_BLOCKSIZE_B;
255                 length_b -= BLAKE_SMALL_BLOCKSIZE;
256         }
257         blake_small_lastBlock(&ctx, msg, length_b);
258         blake256_ctx2hash(dest, &ctx);
259 }
260
261 void blake224(void *dest, const void *msg, uint32_t length_b){
262         blake_small_ctx_t ctx;
263         blake224_init(&ctx);
264         while(length_b>=BLAKE_SMALL_BLOCKSIZE){
265                 blake_small_nextBlock(&ctx, msg);
266                 msg = (uint8_t*)msg + BLAKE_SMALL_BLOCKSIZE_B;
267                 length_b -= BLAKE_SMALL_BLOCKSIZE;
268         }
269         blake_small_lastBlock(&ctx, msg, length_b);
270         blake224_ctx2hash(dest, &ctx);
271 }