3 This file is part of the AVR-Crypto-Lib.
4 Copyright (C) 2009 Daniel Otte (daniel.otte@rub.de)
6 This program is free software: you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation, either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 * \email daniel.otte@rub.de
24 * \license GPLv3 or later
30 #include <avr/pgmspace.h>
32 #include "blake_small.h"
33 #include "blake_common.h"
35 #define BUG_1 0 /* bug compatibility for zero length message */
36 #define BUG_2 0 /* bug compatibility for messages of length%512=505...511 */
39 uint32_t blake_c[] PROGMEM = {
40 0x243F6A88, 0x85A308D3,
41 0x13198A2E, 0x03707344,
42 0xA4093822, 0x299F31D0,
43 0x082EFA98, 0xEC4E6C89,
44 0x452821E6, 0x38D01377,
45 0xBE5466CF, 0x34E90C6C,
46 0xC0AC29B7, 0xC97C50DD,
47 0x3F84D5B5, 0xB5470917
50 #define ROTL32(a, n) (((a)<<(n))|((a)>>(32-(n))))
51 #define ROTR32(a, n) (((a)>>(n))|((a)<<(32-(n))))
52 #define CHANGE_ENDIAN32(a) (((a)<<24)| \
53 ((0x0000ff00&(a))<<8)| \
54 ((0x00ff0000&(a))>>8)| \
57 void blake_small_expand(uint32_t* v, const blake_small_ctx_t* ctx){
59 memcpy(v, ctx->h, 8*4);
61 v[8+i] = pgm_read_dword(&(blake_c[i]));
63 memxor((uint8_t*)v+8, ctx->s, 4*4);
67 void blake_small_changeendian(void* dest, const void* src){
70 ((uint32_t*)dest)[i] = CHANGE_ENDIAN32(((uint32_t*)src)[i]);
74 void blake_small_compress(uint32_t* v,const void* m){
76 uint8_t a,b,c,d, s0, s1;
80 a = pgm_read_byte(blake_index_lut+4*i+0);
81 b = pgm_read_byte(blake_index_lut+4*i+1);
82 c = pgm_read_byte(blake_index_lut+4*i+2);
83 d = pgm_read_byte(blake_index_lut+4*i+3);
84 s0 = pgm_read_byte(blake_sigma+16*r+2*i+0);
85 s1 = pgm_read_byte(blake_sigma+16*r+2*i+1);
92 lv[0] += lv[1] + (((uint32_t*)m)[s0] ^ pgm_read_dword(&(blake_c[s1])));
93 lv[3] = ROTR32(lv[3]^lv[0], 16);
95 lv[1] = ROTR32(lv[1]^lv[2], 12);
96 lv[0] += lv[1] + (((uint32_t*)m)[s1] ^ pgm_read_dword(&(blake_c[s0])));
97 lv[3] = ROTR32(lv[3]^lv[0], 8);
99 lv[1] = ROTR32(lv[1]^lv[2], 7);
109 void blake_small_collapse(blake_small_ctx_t* ctx, uint32_t* v){
112 ctx->h[i] ^= ctx->s[i%4] ^ v[i] ^ v[8+i];
116 void blake_small_nextBlock(blake_small_ctx_t* ctx, const void* msg){
123 blake_small_expand(v,ctx);
125 ctr.v64 = ctx->counter*512;
130 blake_small_changeendian(m, msg);
131 blake_small_compress(v, m);
132 blake_small_collapse(ctx, v);
135 void blake_small_lastBlock(blake_small_ctx_t* ctx, const void* msg, uint16_t length_b){
136 while(length_b>=BLAKE_SMALL_BLOCKSIZE){
137 blake_small_nextBlock(ctx, msg);
138 msg = (uint8_t*)msg + BLAKE_SMALL_BLOCKSIZE_B;
139 length_b -= BLAKE_SMALL_BLOCKSIZE;
150 ctr.v64 = ctx->counter*512+length_b;
154 ctr.v32[0] = ctx->counter*512;
155 ctr.v32[0] |= 0x40+length_b-504;
158 memset(buffer, 0, 64);
159 memcpy(buffer, msg, (length_b+7)/8);
160 buffer[length_b/8] |= 0x80 >> (length_b&0x7);
161 blake_small_changeendian(buffer, buffer);
162 blake_small_expand(v, ctx);
174 if(length_b==0 && ctx->counter==0){
179 if(length_b>512-64-2){
180 blake_small_compress(v, buffer);
181 blake_small_collapse(ctx, v);
182 memset(buffer, 0, 64-8);
183 blake_small_expand(v, ctx);
186 buffer[64-8-4] |= 0x01;
187 *((uint32_t*)(&(buffer[64-8]))) = ctr.v32[1];
188 *((uint32_t*)(&(buffer[64-4]))) = ctr.v32[0];
189 blake_small_compress(v, buffer);
190 blake_small_collapse(ctx, v);
194 uint32_t blake32_iv[] PROGMEM = {
195 0x6A09E667L, 0xBB67AE85,
196 0x3C6EF372L, 0xA54FF53A,
197 0x510E527FL, 0x9B05688C,
198 0x1F83D9ABL, 0x5BE0CD19
201 void blake32_init(blake32_ctx_t* ctx){
204 ctx->h[i] = pgm_read_dword(&(blake32_iv[i]));
206 memset(ctx->s, 0, 4*4);
211 uint32_t blake28_iv[] PROGMEM = {
212 0xC1059ED8, 0x367CD507,
213 0x3070DD17, 0xF70E5939,
214 0xFFC00B31, 0x68581511,
215 0x64F98FA7, 0xBEFA4FA4
218 void blake28_init(blake28_ctx_t* ctx){
221 ctx->h[i] = pgm_read_dword(&(blake28_iv[i]));
223 memset(ctx->s, 0, 4*4);
228 void blake32_ctx2hash(void* dest, const blake32_ctx_t* ctx){
231 ((uint32_t*)dest)[i] = CHANGE_ENDIAN32(ctx->h[i]);
235 void blake28_ctx2hash(void* dest, const blake28_ctx_t* ctx){
238 ((uint32_t*)dest)[i] = CHANGE_ENDIAN32(ctx->h[i]);
242 void blake32_nextBlock(blake32_ctx_t* ctx, const void* block){
243 blake_small_nextBlock(ctx, block);
246 void blake28_nextBlock(blake28_ctx_t* ctx, const void* block){
247 blake_small_nextBlock(ctx, block);
250 void blake32_lastBlock(blake32_ctx_t* ctx, const void* block, uint16_t length_b){
251 blake_small_lastBlock(ctx, block, length_b);
254 void blake28_lastBlock(blake28_ctx_t* ctx, const void* block, uint16_t length_b){
255 blake_small_lastBlock(ctx, block, length_b);
258 void blake32(void* dest, const void* msg, uint32_t length_b){
259 blake_small_ctx_t ctx;
261 while(length_b>=BLAKE_SMALL_BLOCKSIZE){
262 blake_small_nextBlock(&ctx, msg);
263 msg = (uint8_t*)msg + BLAKE_SMALL_BLOCKSIZE_B;
264 length_b -= BLAKE_SMALL_BLOCKSIZE;
266 blake_small_lastBlock(&ctx, msg, length_b);
267 blake32_ctx2hash(dest, &ctx);
270 void blake28(void* dest, const void* msg, uint32_t length_b){
271 blake_small_ctx_t ctx;
273 while(length_b>=BLAKE_SMALL_BLOCKSIZE){
274 blake_small_nextBlock(&ctx, msg);
275 msg = (uint8_t*)msg + BLAKE_SMALL_BLOCKSIZE_B;
276 length_b -= BLAKE_SMALL_BLOCKSIZE;
278 blake_small_lastBlock(&ctx, msg, length_b);
279 blake28_ctx2hash(dest, &ctx);