Import the skein hashing algorithm, based on the threefish block cipher
Connect it to userland (libmd, libcrypt, sbin/md5) and kernel (crypto.ko) Support for skein as a ZFS checksum algorithm was introduced in r289422 but is disconnected because FreeBSD lacked a Skein implementation. A further commit will enable it in ZFS. Reviewed by: cem Sponsored by: ScaleEngine Inc. Differential Revision: https://reviews.freebsd.org/D6166
This commit is contained in:
commit
6d6e6f6722
@ -10,16 +10,25 @@ SHLIBDIR?= /lib
|
||||
SHLIB_MAJOR= 5
|
||||
LIB= crypt
|
||||
|
||||
.PATH: ${.CURDIR}/../libmd ${.CURDIR}/../../sys/crypto/sha2
|
||||
.PATH: ${.CURDIR}/../libmd ${.CURDIR}/../../sys/crypto/sha2 ${.CURDIR}/../../sys/crypto/skein
|
||||
SRCS= crypt.c misc.c \
|
||||
crypt-md5.c md5c.c \
|
||||
crypt-nthash.c md4c.c \
|
||||
crypt-sha256.c sha256c.c \
|
||||
crypt-sha512.c sha512c.c
|
||||
crypt-sha512.c sha512c.c \
|
||||
skein.c skein_block.c
|
||||
MAN= crypt.3
|
||||
MLINKS= crypt.3 crypt_get_format.3 crypt.3 crypt_set_format.3
|
||||
CFLAGS+= -I${.CURDIR}/../libmd -I${.CURDIR}/../libutil \
|
||||
-I${.CURDIR}/../../sys/crypto/sha2
|
||||
-I${.CURDIR}/../../sys/crypto/sha2 -I${.CURDIR}/../../sys/crypto/skein
|
||||
|
||||
# Use assembly optimized skein if available
|
||||
.if exists(${MACHINE_ARCH}/skein_block_asm.s)
|
||||
.PATH: ${.CURDIR}/../../sys/crypto/skein/${MACHINE_ARCH}
|
||||
SRCS += skein_block_asm.s
|
||||
CFLAGS += -DSKEIN_ASM -DSKEIN_USE_ASM=1792 # list of block functions to replace with assembly: 256+512+1024 = 1792
|
||||
ACFLAGS += -DELF -Wa,--noexecstack
|
||||
.endif
|
||||
|
||||
# Pull in the strong crypto, if it is present.
|
||||
.if exists(${.CURDIR}/../../secure/lib/libcrypt) && ${MK_CRYPT} != "no"
|
||||
@ -34,7 +43,10 @@ CFLAGS+= -I${.CURDIR} -DHAS_DES -DHAS_BLOWFISH
|
||||
SHA512_224_Init SHA512_224_Final SHA512_224_Update \
|
||||
SHA512_256_Init SHA512_256_Final SHA512_256_Update \
|
||||
SHA384_Init SHA384_Final SHA384_Update \
|
||||
SHA512_Init SHA512_Final SHA512_Update
|
||||
SHA512_Init SHA512_Final SHA512_Update \
|
||||
SKEIN256_Init SKEIN256_Final SKEIN256_Update \
|
||||
SKEIN512_Init SKEIN512_Final SKEIN512_Update \
|
||||
SKEIN1024_Init SKEIN1024_Final SKEIN1024_Update
|
||||
CFLAGS+= -D${sym}=__${sym}
|
||||
.endfor
|
||||
|
||||
|
@ -9,12 +9,15 @@ SRCS= md4c.c md5c.c md4hl.c md5hl.c \
|
||||
sha0c.c sha0hl.c sha1c.c sha1hl.c \
|
||||
sha256c.c sha256hl.c \
|
||||
sha384hl.c \
|
||||
sha512c.c sha512hl.c sha512thl.c
|
||||
INCS= md4.h md5.h ripemd.h sha.h sha256.h sha384.h sha512.h sha512t.h
|
||||
sha512c.c sha512hl.c sha512thl.c \
|
||||
skein.c skein_block.c \
|
||||
skein256hl.c skein512hl.c skein1024hl.c
|
||||
INCS= md4.h md5.h ripemd.h sha.h sha256.h sha384.h sha512.h sha512t.h \
|
||||
skein.h skein_port.h skein_freebsd.h skein_iv.h
|
||||
|
||||
WARNS?= 0
|
||||
|
||||
MAN+= md4.3 md5.3 ripemd.3 sha.3 sha256.3 sha512.3
|
||||
MAN+= md4.3 md5.3 ripemd.3 sha.3 sha256.3 sha512.3 skein.3
|
||||
MLINKS+=md4.3 MD4Init.3 md4.3 MD4Update.3 md4.3 MD4Final.3
|
||||
MLINKS+=md4.3 MD4End.3 md4.3 MD4File.3 md4.3 MD4FileChunk.3
|
||||
MLINKS+=md4.3 MD4Data.3
|
||||
@ -47,11 +50,27 @@ MLINKS+=sha512.3 SHA512_256_Init.3 sha512.3 SHA512_256_Update.3
|
||||
MLINKS+=sha512.3 SHA512_256_Final.3 sha512.3 SHA512_256_End.3
|
||||
MLINKS+=sha512.3 SHA512_256_File.3 sha512.3 SHA512_256_FileChunk.3
|
||||
MLINKS+=sha512.3 SHA512_256_Data.3
|
||||
MLINKS+=skein.3 SKEIN256_Init.3 skein.3 SKEIN256_Update.3
|
||||
MLINKS+=skein.3 SKEIN256_Final.3 skein.3 SKEIN256_End.3
|
||||
MLINKS+=skein.3 SKEIN256_File.3 skein.3 SKEIN256_FileChunk.3
|
||||
MLINKS+=skein.3 SKEIN256_Data.3 skein.3 skein256.3
|
||||
MLINKS+=skein.3 SKEIN512_Init.3 skein.3 SKEIN512_Update.3
|
||||
MLINKS+=skein.3 SKEIN512_Final.3 skein.3 SKEIN512_End.3
|
||||
MLINKS+=skein.3 SKEIN512_File.3 skein.3 SKEIN512_FileChunk.3
|
||||
MLINKS+=skein.3 SKEIN512_Data.3 skein.3 skein512.3
|
||||
MLINKS+=skein.3 SKEIN1024_Init.3 skein.3 SKEIN1024_Update.3
|
||||
MLINKS+=skein.3 SKEIN1024_Final.3 skein.3 SKEIN1024_End.3
|
||||
MLINKS+=skein.3 SKEIN1024_File.3 skein.3 SKEIN1024_FileChunk.3
|
||||
MLINKS+=skein.3 SKEIN1024_Data.3 skein.3 skein1024.3
|
||||
|
||||
CLEANFILES+= md[245]hl.c md[245].ref md[245].3 mddriver \
|
||||
rmd160.ref rmd160hl.c rmddriver \
|
||||
sha0.ref sha0hl.c sha1.ref sha1hl.c shadriver \
|
||||
sha256.ref sha256hl.c sha384hl.c sha384.ref \
|
||||
sha512.ref sha512hl.c sha512t256.ref sha512thl.c
|
||||
sha512.ref sha512hl.c sha512t256.ref sha512thl.c \
|
||||
skein256hl.c skein512hl.c skein1024hl.c \
|
||||
skein256.ref skein512.ref skein1024.ref \
|
||||
skeindriver
|
||||
|
||||
# Define WEAK_REFS to provide weak aliases for libmd symbols
|
||||
#
|
||||
@ -60,8 +79,10 @@ CLEANFILES+= md[245]hl.c md[245].ref md[245].3 mddriver \
|
||||
# * macros are used to rename symbols to libcrypt internal names
|
||||
# * no weak aliases are generated
|
||||
CFLAGS+= -I${.CURDIR} -I${.CURDIR}/../../sys/crypto/sha2
|
||||
CFLAGS+= -I${.CURDIR}/../../sys/crypto/skein
|
||||
CFLAGS+= -DWEAK_REFS
|
||||
.PATH: ${.CURDIR}/${MACHINE_ARCH} ${.CURDIR}/../../sys/crypto/sha2
|
||||
.PATH: ${.CURDIR}/../../sys/crypto/skein ${.CURDIR}/../../sys/crypto/skein/${MACHINE_ARCH}
|
||||
|
||||
.if exists(${MACHINE_ARCH}/sha.S)
|
||||
SRCS+= sha.S
|
||||
@ -71,7 +92,11 @@ CFLAGS+= -DSHA1_ASM
|
||||
SRCS+= rmd160.S
|
||||
CFLAGS+= -DRMD160_ASM
|
||||
.endif
|
||||
.if exists(${MACHINE_ARCH}/sha.S) || exists(${MACHINE_ARCH}/rmd160.S)
|
||||
.if exists(${MACHINE_ARCH}/skein_block_asm.s)
|
||||
SRCS+= skein_block_asm.s
|
||||
CFLAGS+= -DSKEIN_ASM -DSKEIN_USE_ASM=1792 # list of block functions to replace with assembly: 256+512+1024 = 1792
|
||||
.endif
|
||||
.if exists(${MACHINE_ARCH}/sha.S) || exists(${MACHINE_ARCH}/rmd160.S) || exists(${MACHINE_ARCH}/skein_block_asm.s)
|
||||
ACFLAGS+= -DELF -Wa,--noexecstack
|
||||
.endif
|
||||
|
||||
@ -124,6 +149,25 @@ rmd160hl.c: mdXhl.c
|
||||
-e 's/RIPEMD160__/RIPEMD160_/g' \
|
||||
${.ALLSRC}) > ${.TARGET}
|
||||
|
||||
skein256hl.c: mdXhl.c
|
||||
(echo '#define LENGTH 32'; \
|
||||
sed -e 's/mdX/skein/g' -e 's/MDX/SKEIN256_/g' \
|
||||
-e 's/SKEIN256__/SKEIN256_/g' \
|
||||
${.ALLSRC}) > ${.TARGET}
|
||||
|
||||
skein512hl.c: mdXhl.c
|
||||
(echo '#define LENGTH 64'; \
|
||||
sed -e 's/mdX/skein/g' -e 's/MDX/SKEIN512_/g' \
|
||||
-e 's/SKEIN512__/SKEIN512_/g' \
|
||||
${.ALLSRC}) > ${.TARGET}
|
||||
|
||||
skein1024hl.c: mdXhl.c
|
||||
(echo '#define LENGTH 128'; \
|
||||
sed -e 's/mdX/skein/g' -e 's/MDX/SKEIN1024_/g' \
|
||||
-e 's/SKEIN1024__/SKEIN1024_/g' \
|
||||
${.ALLSRC}) > ${.TARGET}
|
||||
|
||||
|
||||
.for i in 2 4 5
|
||||
md${i}.3: ${.CURDIR}/mdX.3
|
||||
sed -e "s/mdX/md${i}/g" -e "s/MDX/MD${i}/g" ${.ALLSRC} > ${.TARGET}
|
||||
@ -250,8 +294,51 @@ rmd160.ref:
|
||||
@echo 'RIPEMD160 ("12345678901234567890123456789012345678901234567890123456789012345678901234567890") =' \
|
||||
'9b752e45573d4b39f4dbd3323cab82bf63326bfb' >> ${.TARGET}
|
||||
|
||||
skein256.ref:
|
||||
echo 'SKEIN256 test suite:' > ${.TARGET}
|
||||
@echo 'SKEIN256 ("") = c8877087da56e072870daa843f176e9453115929094c3a40c463a196c29bf7ba' >> ${.TARGET}
|
||||
@echo 'SKEIN256 ("abc") = 258bdec343b9fde1639221a5ae0144a96e552e5288753c5fec76c05fc2fc1870' >> ${.TARGET}
|
||||
@echo 'SKEIN256 ("message digest") =' \
|
||||
'4d2ce0062b5eb3a4db95bc1117dd8aa014f6cd50fdc8e64f31f7d41f9231e488' >> ${.TARGET}
|
||||
@echo 'SKEIN256 ("abcdefghijklmnopqrstuvwxyz") =' \
|
||||
'46d8440685461b00e3ddb891b2ecc6855287d2bd8834a95fb1c1708b00ea5e82' >> ${.TARGET}
|
||||
@echo 'SKEIN256 ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") =' \
|
||||
'7c5eb606389556b33d34eb2536459528dc0af97adbcd0ce273aeb650f598d4b2' >> ${.TARGET}
|
||||
@echo 'SKEIN256 ("12345678901234567890123456789012345678901234567890123456789012345678901234567890") =' \
|
||||
'4def7a7e5464a140ae9c3a80279fbebce4bd00f9faad819ab7e001512f67a10d' >> ${.TARGET}
|
||||
|
||||
skein512.ref:
|
||||
echo 'SKEIN512 test suite:' > ${.TARGET}
|
||||
@echo 'SKEIN512 ("") =' \
|
||||
'bc5b4c50925519c290cc634277ae3d6257212395cba733bbad37a4af0fa06af41fca7903d06564fea7a2d3730dbdb80c1f85562dfcc070334ea4d1d9e72cba7a' >> ${.TARGET}
|
||||
@echo 'SKEIN512 ("abc") =' \
|
||||
'8f5dd9ec798152668e35129496b029a960c9a9b88662f7f9482f110b31f9f93893ecfb25c009baad9e46737197d5630379816a886aa05526d3a70df272d96e75' >> ${.TARGET}
|
||||
@echo 'SKEIN512 ("message digest") =' \
|
||||
'15b73c158ffb875fed4d72801ded0794c720b121c0c78edf45f900937e6933d9e21a3a984206933d504b5dbb2368000411477ee1b204c986068df77886542fcc' >> ${.TARGET}
|
||||
@echo 'SKEIN512 ("abcdefghijklmnopqrstuvwxyz") =' \
|
||||
'23793ad900ef12f9165c8080da6fdfd2c8354a2929b8aadf83aa82a3c6470342f57cf8c035ec0d97429b626c4d94f28632c8f5134fd367dca5cf293d2ec13f8c' >> ${.TARGET}
|
||||
@echo 'SKEIN512 ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") =' \
|
||||
'0c6bed927e022f5ddcf81877d42e5f75798a9f8fd3ede3d83baac0a2f364b082e036c11af35fe478745459dd8f5c0b73efe3c56ba5bb2009208d5a29cc6e469c' >> ${.TARGET}
|
||||
@echo 'SKEIN512 ("12345678901234567890123456789012345678901234567890123456789012345678901234567890") =' \
|
||||
'2ca9fcffb3456f297d1b5f407014ecb856f0baac8eb540f534b1f187196f21e88f31103128c2f03fcc9857d7a58eb66f9525e2302d88833ee069295537a434ce' >> ${.TARGET}
|
||||
|
||||
skein1024.ref:
|
||||
echo 'SKEIN1024 test suite:' > ${.TARGET}
|
||||
@echo 'SKEIN1024 ("") =' \
|
||||
'0fff9563bb3279289227ac77d319b6fff8d7e9f09da1247b72a0a265cd6d2a62645ad547ed8193db48cff847c06494a03f55666d3b47eb4c20456c9373c86297d630d5578ebd34cb40991578f9f52b18003efa35d3da6553ff35db91b81ab890bec1b189b7f52cb2a783ebb7d823d725b0b4a71f6824e88f68f982eefc6d19c6' >> ${.TARGET}
|
||||
@echo 'SKEIN1024 ("abc") =' \
|
||||
'35a599a0f91abcdb4cb73c19b8cb8d947742d82c309137a7caed29e8e0a2ca7a9ff9a90c34c1908cc7e7fd99bb15032fb86e76df21b72628399b5f7c3cc209d7bb31c99cd4e19465622a049afbb87c03b5ce3888d17e6e667279ec0aa9b3e2712624c01b5f5bbe1a564220bdcf6990af0c2539019f313fdd7406cca3892a1f1f' >> ${.TARGET}
|
||||
@echo 'SKEIN1024 ("message digest") =' \
|
||||
'ea891f5268acd0fac97467fc1aa89d1ce8681a9992a42540e53babee861483110c2d16f49e73bac27653ff173003e40cfb08516cd34262e6af95a5d8645c9c1abb3e813604d508b8511b30f9a5c1b352aa0791c7d2f27b2706dccea54bc7de6555b5202351751c3299f97c09cf89c40f67187e2521c0fad82b30edbb224f0458' >> ${.TARGET}
|
||||
@echo 'SKEIN1024 ("abcdefghijklmnopqrstuvwxyz") =' \
|
||||
'f23d95c2a25fbcd0e797cd058fec39d3c52d2b5afd7a9af1df934e63257d1d3dcf3246e7329c0f1104c1e51e3d22e300507b0c3b9f985bb1f645ef49835080536becf83788e17fed09c9982ba65c3cb7ffe6a5f745b911c506962adf226e435c42f6f6bc08d288f9c810e807e3216ef444f3db22744441deefa4900982a1371f' >> ${.TARGET}
|
||||
@echo 'SKEIN1024 ("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789") =' \
|
||||
'cf3889e8a8d11bfd3938055d7d061437962bc5eac8ae83b1b71c94be201b8cf657fdbfc38674997a008c0c903f56a23feb3ae30e012377f1cfa080a9ca7fe8b96138662653fb3335c7d06595bf8baf65e215307532094cfdfa056bd8052ab792a3944a2adaa47b30335b8badb8fe9eb94fe329cdca04e58bbc530f0af709f469' >> ${.TARGET}
|
||||
@echo 'SKEIN1024 ("12345678901234567890123456789012345678901234567890123456789012345678901234567890") =' \
|
||||
'cf21a613620e6c119eca31fdfaad449a8e02f95ca256c21d2a105f8e4157048f9fe1e897893ea18b64e0e37cb07d5ac947f27ba544caf7cbc1ad094e675aed77a366270f7eb7f46543bccfa61c526fd628408058ed00ed566ac35a9761d002e629c4fb0d430b2f4ad016fcc49c44d2981c4002da0eecc42144160e2eaea4855a' >> ${.TARGET}
|
||||
|
||||
test: md4.ref md5.ref sha0.ref rmd160.ref sha1.ref sha256.ref sha384.ref \
|
||||
sha512.ref sha512t256.ref
|
||||
sha512.ref sha512t256.ref skein256.ref skein512.ref skein1024.ref
|
||||
@${ECHO} if any of these test fail, the code produces wrong results
|
||||
@${ECHO} and should NOT be used.
|
||||
${CC} ${CFLAGS} ${LDFLAGS} -DMD=4 -o mddriver ${.CURDIR}/mddriver.c libmd.a
|
||||
@ -284,5 +371,15 @@ test: md4.ref md5.ref sha0.ref rmd160.ref sha1.ref sha256.ref sha384.ref \
|
||||
./shadriver | cmp sha512t256.ref -
|
||||
@${ECHO} SHA-512t256 passed test
|
||||
-rm -f shadriver
|
||||
${CC} ${CFLAGS} ${LDFLAGS} -DSKEIN=256 -o skeindriver ${.CURDIR}/skeindriver.c libmd.a
|
||||
./skeindriver | cmp skein256.ref -
|
||||
@${ECHO} SKEIN256 passed test
|
||||
${CC} ${CFLAGS} ${LDFLAGS} -DSKEIN=512 -o skeindriver ${.CURDIR}/skeindriver.c libmd.a
|
||||
./skeindriver | cmp skein512.ref -
|
||||
@${ECHO} SKEIN512 passed test
|
||||
${CC} ${CFLAGS} ${LDFLAGS} -DSKEIN=1024 -o skeindriver ${.CURDIR}/skeindriver.c libmd.a
|
||||
./skeindriver | cmp skein1024.ref -
|
||||
@${ECHO} SKEIN1024 passed test
|
||||
-rm -f skeindriver
|
||||
|
||||
.include <bsd.lib.mk>
|
||||
|
@ -8,7 +8,7 @@
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd February 11, 1999
|
||||
.Dd April 26, 2016
|
||||
.Dt MDX 3
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -145,7 +145,11 @@ argument is non-null it must point to at least 33 characters of buffer space.
|
||||
.Sh SEE ALSO
|
||||
.Xr md4 3 ,
|
||||
.Xr md5 3 ,
|
||||
.Xr sha 3
|
||||
.Xr ripemd 3 ,
|
||||
.Xr sha 3 ,
|
||||
.Xr sha256 3 ,
|
||||
.Xr sha512 3 ,
|
||||
.Xr skein 3
|
||||
.Rs
|
||||
.%A R. Rivest
|
||||
.%T The MD4 Message-Digest Algorithm
|
||||
|
@ -9,7 +9,7 @@
|
||||
.\" From: Id: mdX.3,v 1.14 1999/02/11 20:31:49 wollman Exp
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd March 28, 2014
|
||||
.Dd April 26, 2016
|
||||
.Dt RIPEMD 3
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -125,7 +125,10 @@ argument is non-null it must point to at least 41 characters of buffer space.
|
||||
.Sh SEE ALSO
|
||||
.Xr md4 3 ,
|
||||
.Xr md5 3 ,
|
||||
.Xr sha 3
|
||||
.Xr sha 3 ,
|
||||
.Xr sha256 3 ,
|
||||
.Xr sha512 3 ,
|
||||
.Xr skein 3
|
||||
.Sh HISTORY
|
||||
These functions appeared in
|
||||
.Fx 4.0 .
|
||||
|
@ -9,7 +9,7 @@
|
||||
.\" From: Id: mdX.3,v 1.14 1999/02/11 20:31:49 wollman Exp
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd March 28, 2014
|
||||
.Dd April 26, 2016
|
||||
.Dt SHA 3
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -157,7 +157,9 @@ argument is non-null it must point to at least 41 characters of buffer space.
|
||||
.Xr md4 3 ,
|
||||
.Xr md5 3 ,
|
||||
.Xr ripemd 3 ,
|
||||
.Xr sha256 3
|
||||
.Xr sha256 3 ,
|
||||
.Xr sha512 3 ,
|
||||
.Xr skein 3
|
||||
.Sh HISTORY
|
||||
These functions appeared in
|
||||
.Fx 4.0 .
|
||||
|
@ -9,7 +9,7 @@
|
||||
.\" From: Id: mdX.3,v 1.14 1999/02/11 20:31:49 wollman Exp
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd March 28, 2014
|
||||
.Dd April 26, 2016
|
||||
.Dt SHA256 3
|
||||
.Os
|
||||
.Sh NAME
|
||||
@ -123,7 +123,10 @@ argument is non-null it must point to at least 65 characters of buffer space.
|
||||
.Xr md4 3 ,
|
||||
.Xr md5 3 ,
|
||||
.Xr ripemd 3 ,
|
||||
.Xr sha 3
|
||||
.Xr sha 3 ,
|
||||
.Xr sha256 3 ,
|
||||
.Xr sha512 3 ,
|
||||
.Xr skein 3
|
||||
.Sh HISTORY
|
||||
These functions appeared in
|
||||
.Fx 6.0 .
|
||||
|
@ -192,7 +192,10 @@ string which represents the 256 bits in hexadecimal.
|
||||
.Xr md4 3 ,
|
||||
.Xr md5 3 ,
|
||||
.Xr ripemd 3 ,
|
||||
.Xr sha 3
|
||||
.Xr sha 3 ,
|
||||
.Xr sha256 3 ,
|
||||
.Xr sha512 3 ,
|
||||
.Xr skein 3
|
||||
.Sh HISTORY
|
||||
These functions appeared in
|
||||
.Fx 9.0 .
|
||||
|
214
lib/libmd/skein.3
Normal file
214
lib/libmd/skein.3
Normal file
@ -0,0 +1,214 @@
|
||||
.\"-
|
||||
.\" Copyright (c) 2016 Allan Jude
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" $FreeBSD$
|
||||
.\"
|
||||
.Dd May 28, 2016
|
||||
.Dt SKEIN 3
|
||||
.Os
|
||||
.Sh NAME
|
||||
.Nm SKEIN256_Init ,
|
||||
.Nm SKEIN256_Update ,
|
||||
.Nm SKEIN256_Final ,
|
||||
.Nm SKEIN256_End ,
|
||||
.Nm SKEIN256_File ,
|
||||
.Nm SKEIN256_FileChunk ,
|
||||
.Nm SKEIN256_Data ,
|
||||
.Nm SKEIN512_Init ,
|
||||
.Nm SKEIN512_Update ,
|
||||
.Nm SKEIN512_Final ,
|
||||
.Nm SKEIN512_End ,
|
||||
.Nm SKEIN512_File ,
|
||||
.Nm SKEIN512_FileChunk ,
|
||||
.Nm SKEIN512_Data ,
|
||||
.Nm SKEIN1024_Init ,
|
||||
.Nm SKEIN1024_Update ,
|
||||
.Nm SKEIN1024_Final ,
|
||||
.Nm SKEIN1024_End ,
|
||||
.Nm SKEIN1024_File ,
|
||||
.Nm SKEIN1024_FileChunk ,
|
||||
.Nm SKEIN1024_Data
|
||||
.Nd calculate the ``SKEIN'' family of message digests
|
||||
.Sh LIBRARY
|
||||
.Lb libmd
|
||||
.Sh SYNOPSIS
|
||||
.In sys/types.h
|
||||
.In skein.h
|
||||
.Ft void
|
||||
.Fn SKEIN256_Init "SKEIN256_CTX *context"
|
||||
.Ft void
|
||||
.Fn SKEIN256_Update "SKEIN256_CTX *context" "const unsigned char *data" "size_t len"
|
||||
.Ft void
|
||||
.Fn SKEIN256_Final "unsigned char digest[32]" "SKEIN256_CTX *context"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN256_End "SKEIN256_CTX *context" "char *buf"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN256_File "const char *filename" "char *buf"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN256_FileChunk "const char *filename" "char *buf" "off_t offset" "off_t length"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN256_Data "const unsigned char *data" "unsigned int len" "char *buf"
|
||||
.Ft void
|
||||
.Fn SKEIN512_Init "SKEIN512_CTX *context"
|
||||
.Ft void
|
||||
.Fn SKEIN512_Update "SKEIN512_CTX *context" "const unsigned char *data" "size_t len"
|
||||
.Ft void
|
||||
.Fn SKEIN512_Final "unsigned char digest[64]" "SKEIN512_CTX *context"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN512_End "SKEIN512_CTX *context" "char *buf"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN512_File "const char *filename" "char *buf"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN512_FileChunk "const char *filename" "char *buf" "off_t offset" "off_t length"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN512_Data "const unsigned char *data" "unsigned int len" "char *buf"
|
||||
.Ft void
|
||||
.Fn SKEIN1024_Init "SKEIN1024_CTX *context"
|
||||
.Ft void
|
||||
.Fn SKEIN1024_Update "SKEIN1024_CTX *context" "const unsigned char *data" "size_t len"
|
||||
.Ft void
|
||||
.Fn SKEIN1024_Final "unsigned char digest[128]" "SKEIN1024_CTX *context"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN1024_End "SKEIN1024_CTX *context" "char *buf"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN1024_File "const char *filename" "char *buf"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN1024_FileChunk "const char *filename" "char *buf" "off_t offset" "off_t length"
|
||||
.Ft "char *"
|
||||
.Fn SKEIN1024_Data "const unsigned char *data" "unsigned int len" "char *buf"
|
||||
.Sh DESCRIPTION
|
||||
.Li Skein
|
||||
is a new family of cryptographic hash functions based on the
|
||||
.Li Threefish
|
||||
large-block cipher.
|
||||
Its design combines speed, security, simplicity, and a great deal of
|
||||
flexibility in a modular package that is easy to analyze.
|
||||
.Li Skein
|
||||
is defined for three different internal state sizes\(em256 bits, 512 bits, and
|
||||
1024 bits\(emand any output size.
|
||||
This allows Skein to be a drop-in replacement for the entire SHA family
|
||||
of hash functions.
|
||||
.Pp
|
||||
The
|
||||
.Fn SKEIN256_Init ,
|
||||
.Fn SKEIN256_Update ,
|
||||
and
|
||||
.Fn SKEIN256_Final
|
||||
functions are the core functions.
|
||||
Allocate an
|
||||
.Vt SKEIN256_CTX ,
|
||||
initialize it with
|
||||
.Fn SKEIN256_Init ,
|
||||
run over the data with
|
||||
.Fn SKEIN256_Update ,
|
||||
and finally extract the result using
|
||||
.Fn SKEIN256_Final .
|
||||
.Pp
|
||||
.Fn SKEIN256_End
|
||||
is a wrapper for
|
||||
.Fn SKEIN256_Final
|
||||
which converts the return value to a 33-character
|
||||
(including the terminating '\e0')
|
||||
.Tn ASCII
|
||||
string which represents the 256 bits in hexadecimal.
|
||||
.Pp
|
||||
.Fn SKEIN256_File
|
||||
calculates the digest of a file, and uses
|
||||
.Fn SKEIN256_End
|
||||
to return the result.
|
||||
If the file cannot be opened, a null pointer is returned.
|
||||
.Fn SKEIN256_FileChunk
|
||||
is similar to
|
||||
.Fn SKEIN256_File ,
|
||||
but it only calculates the digest over a byte-range of the file specified,
|
||||
starting at
|
||||
.Fa offset
|
||||
and spanning
|
||||
.Fa length
|
||||
bytes.
|
||||
If the
|
||||
.Fa length
|
||||
parameter is specified as 0, or more than the length of the remaining part
|
||||
of the file,
|
||||
.Fn SKEIN256_FileChunk
|
||||
calculates the digest from
|
||||
.Fa offset
|
||||
to the end of file.
|
||||
.Fn SKEIN256_Data
|
||||
calculates the digest of a chunk of data in memory, and uses
|
||||
.Fn SKEIN256_End
|
||||
to return the result.
|
||||
.Pp
|
||||
When using
|
||||
.Fn SKEIN256_End ,
|
||||
.Fn SKEIN256_File ,
|
||||
or
|
||||
.Fn SKEIN256_Data ,
|
||||
the
|
||||
.Fa buf
|
||||
argument can be a null pointer, in which case the returned string
|
||||
is allocated with
|
||||
.Xr malloc 3
|
||||
and subsequently must be explicitly deallocated using
|
||||
.Xr free 3
|
||||
after use.
|
||||
If the
|
||||
.Fa buf
|
||||
argument is non-null it must point to at least 33 characters of buffer space.
|
||||
.Pp
|
||||
The
|
||||
.Li SKEIN512_
|
||||
and
|
||||
.Li SKEIN1024_
|
||||
functions are similar to the
|
||||
.Li SKEIN256_
|
||||
functions except they produce a 512-bit, 65 character,
|
||||
or 1024-bit, 129 character, output.
|
||||
.Sh SEE ALSO
|
||||
.Xr md4 3 ,
|
||||
.Xr md5 3 ,
|
||||
.Xr ripemd 3 ,
|
||||
.Xr sha 3 ,
|
||||
.Xr sha256 3 ,
|
||||
.Xr sha512 3
|
||||
.Sh HISTORY
|
||||
These functions appeared in
|
||||
.Fx 11.0 .
|
||||
.Sh AUTHORS
|
||||
.An -nosplit
|
||||
The core hash routines were imported from version 1.3 of the optimized
|
||||
Skein reference implementation written by
|
||||
.An Doug Whiting
|
||||
as submitted to the NSA SHA-3 contest.
|
||||
The algorithms were developed by
|
||||
.An Niels Ferguson ,
|
||||
.An Stefan Lucks ,
|
||||
.An Bruce Schneier ,
|
||||
.An Doug Whiting ,
|
||||
.An Mihir Bellare ,
|
||||
.An Tadayoshi Kohno ,
|
||||
.An Jon Callas,
|
||||
and
|
||||
.An Jesse Walker .
|
68
lib/libmd/skeindriver.c
Normal file
68
lib/libmd/skeindriver.c
Normal file
@ -0,0 +1,68 @@
|
||||
/* SKEINDRIVER.C - test driver for SKEIN */
|
||||
|
||||
/* Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All rights
|
||||
* reserved.
|
||||
*
|
||||
* RSA Data Security, Inc. makes no representations concerning either the
|
||||
* merchantability of this software or the suitability of this software for
|
||||
* any particular purpose. It is provided "as is" without express or implied
|
||||
* warranty of any kind.
|
||||
*
|
||||
* These notices must be retained in any copies of any part of this
|
||||
* documentation and/or software. */
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
__FBSDID("$FreeBSD$");
|
||||
|
||||
#include <sys/types.h>
|
||||
|
||||
#include <stdio.h>
|
||||
#include <time.h>
|
||||
#include <string.h>
|
||||
|
||||
#include "skein.h"
|
||||
|
||||
/* The following makes SKEIN default to SKEIN512 if it has not already been
|
||||
* defined with C compiler flags. */
|
||||
#ifndef SKEIN
|
||||
#define SKEIN 512
|
||||
#endif
|
||||
|
||||
#if SKEIN == 256
|
||||
#undef SKEIN_Data
|
||||
#define SKEIN_Data SKEIN256_Data
|
||||
#elif SKEIN == 512
|
||||
#undef SKEIN_Data
|
||||
#define SKEIN_Data SKEIN512_Data
|
||||
#elif SKEIN == 1024
|
||||
#undef SKEIN_Data
|
||||
#define SKEIN_Data SKEIN1024_Data
|
||||
#endif
|
||||
|
||||
/* Digests a string and prints the result. */
|
||||
static void
|
||||
SKEINString(char *string)
|
||||
{
|
||||
char buf[2*128 + 1];
|
||||
|
||||
printf("SKEIN%d (\"%s\") = %s\n",
|
||||
SKEIN, string, SKEIN_Data(string, strlen(string), buf));
|
||||
}
|
||||
|
||||
/* Digests a reference suite of strings and prints the results. */
|
||||
int
|
||||
main(void)
|
||||
{
|
||||
printf("SKEIN%d test suite:\n", SKEIN);
|
||||
|
||||
SKEINString("");
|
||||
SKEINString("abc");
|
||||
SKEINString("message digest");
|
||||
SKEINString("abcdefghijklmnopqrstuvwxyz");
|
||||
SKEINString("ABCDEFGHIJKLMNOPQRSTUVWXYZ"
|
||||
"abcdefghijklmnopqrstuvwxyz0123456789");
|
||||
SKEINString("1234567890123456789012345678901234567890"
|
||||
"1234567890123456789012345678901234567890");
|
||||
|
||||
return 0;
|
||||
}
|
@ -9,14 +9,20 @@ LINKS= ${BINDIR}/md5 ${BINDIR}/rmd160 \
|
||||
${BINDIR}/md5 ${BINDIR}/sha256 \
|
||||
${BINDIR}/md5 ${BINDIR}/sha384 \
|
||||
${BINDIR}/md5 ${BINDIR}/sha512 \
|
||||
${BINDIR}/md5 ${BINDIR}/sha512t256
|
||||
${BINDIR}/md5 ${BINDIR}/sha512t256 \
|
||||
${BINDIR}/md5 ${BINDIR}/skein256 \
|
||||
${BINDIR}/md5 ${BINDIR}/skein512 \
|
||||
${BINDIR}/md5 ${BINDIR}/skein1024
|
||||
|
||||
MLINKS= md5.1 rmd160.1 \
|
||||
md5.1 sha1.1 \
|
||||
md5.1 sha256.1 \
|
||||
md5.1 sha384.1 \
|
||||
md5.1 sha512.1 \
|
||||
md5.1 sha512t256.1
|
||||
md5.1 sha512t256.1 \
|
||||
md5.1 skein256.1 \
|
||||
md5.1 skein512.1 \
|
||||
md5.1 skein1024.1
|
||||
|
||||
LIBADD= md
|
||||
|
||||
|
@ -31,6 +31,7 @@ __FBSDID("$FreeBSD$");
|
||||
#include <sha384.h>
|
||||
#include <sha512.h>
|
||||
#include <sha512t.h>
|
||||
#include <skein.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
@ -61,6 +62,9 @@ extern const char *SHA384_TestOutput[MDTESTCOUNT];
|
||||
extern const char *SHA512_TestOutput[MDTESTCOUNT];
|
||||
extern const char *SHA512t256_TestOutput[MDTESTCOUNT];
|
||||
extern const char *RIPEMD160_TestOutput[MDTESTCOUNT];
|
||||
extern const char *SKEIN256_TestOutput[MDTESTCOUNT];
|
||||
extern const char *SKEIN512_TestOutput[MDTESTCOUNT];
|
||||
extern const char *SKEIN1024_TestOutput[MDTESTCOUNT];
|
||||
|
||||
typedef struct Algorithm_t {
|
||||
const char *progname;
|
||||
@ -87,12 +91,15 @@ typedef union {
|
||||
SHA384_CTX sha384;
|
||||
SHA512_CTX sha512;
|
||||
RIPEMD160_CTX ripemd160;
|
||||
SKEIN256_CTX skein256;
|
||||
SKEIN512_CTX skein512;
|
||||
SKEIN1024_CTX skein1024;
|
||||
} DIGEST_CTX;
|
||||
|
||||
/* max(MD5_DIGEST_LENGTH, SHA_DIGEST_LENGTH,
|
||||
SHA256_DIGEST_LENGTH, SHA512_DIGEST_LENGTH,
|
||||
RIPEMD160_DIGEST_LENGTH)*2+1 */
|
||||
#define HEX_DIGEST_LENGTH 129
|
||||
RIPEMD160_DIGEST_LENGTH, SKEIN1024_DIGEST_LENGTH)*2+1 */
|
||||
#define HEX_DIGEST_LENGTH 257
|
||||
|
||||
/* algorithm function table */
|
||||
|
||||
@ -117,7 +124,16 @@ static const struct Algorithm_t Algorithm[] = {
|
||||
&SHA512_256_Data, &SHA512_256_File },
|
||||
{ "rmd160", "RMD160", &RIPEMD160_TestOutput,
|
||||
(DIGEST_Init*)&RIPEMD160_Init, (DIGEST_Update*)&RIPEMD160_Update,
|
||||
(DIGEST_End*)&RIPEMD160_End, &RIPEMD160_Data, &RIPEMD160_File }
|
||||
(DIGEST_End*)&RIPEMD160_End, &RIPEMD160_Data, &RIPEMD160_File },
|
||||
{ "skein256", "Skein256", &SKEIN256_TestOutput,
|
||||
(DIGEST_Init*)&SKEIN256_Init, (DIGEST_Update*)&SKEIN256_Update,
|
||||
(DIGEST_End*)&SKEIN256_End, &SKEIN256_Data, &SKEIN256_File },
|
||||
{ "skein512", "Skein512", &SKEIN512_TestOutput,
|
||||
(DIGEST_Init*)&SKEIN512_Init, (DIGEST_Update*)&SKEIN512_Update,
|
||||
(DIGEST_End*)&SKEIN512_End, &SKEIN512_Data, &SKEIN512_File },
|
||||
{ "skein1024", "Skein1024", &SKEIN1024_TestOutput,
|
||||
(DIGEST_Init*)&SKEIN1024_Init, (DIGEST_Update*)&SKEIN1024_Update,
|
||||
(DIGEST_End*)&SKEIN1024_End, &SKEIN1024_Data, &SKEIN1024_File }
|
||||
};
|
||||
|
||||
static void
|
||||
@ -286,8 +302,8 @@ MDTimeTrial(const Algorithm_t *alg)
|
||||
printf(" done\n");
|
||||
printf("Digest = %s", p);
|
||||
printf("\nTime = %f seconds\n", seconds);
|
||||
printf("Speed = %f bytes/second\n",
|
||||
(float) TEST_BLOCK_LEN * (float) TEST_BLOCK_COUNT / seconds);
|
||||
printf("Speed = %f MiB/second\n", (float) TEST_BLOCK_LEN *
|
||||
(float) TEST_BLOCK_COUNT / seconds / (1 << 20));
|
||||
}
|
||||
/*
|
||||
* Digests a reference suite of strings and prints the results.
|
||||
@ -382,6 +398,39 @@ const char *RIPEMD160_TestOutput[MDTESTCOUNT] = {
|
||||
"5feb69c6bf7c29d95715ad55f57d8ac5b2b7dd32"
|
||||
};
|
||||
|
||||
const char *SKEIN256_TestOutput[MDTESTCOUNT] = {
|
||||
"c8877087da56e072870daa843f176e9453115929094c3a40c463a196c29bf7ba",
|
||||
"7fba44ff1a31d71a0c1f82e6e82fb5e9ac6c92a39c9185b9951fed82d82fe635",
|
||||
"258bdec343b9fde1639221a5ae0144a96e552e5288753c5fec76c05fc2fc1870",
|
||||
"4d2ce0062b5eb3a4db95bc1117dd8aa014f6cd50fdc8e64f31f7d41f9231e488",
|
||||
"46d8440685461b00e3ddb891b2ecc6855287d2bd8834a95fb1c1708b00ea5e82",
|
||||
"7c5eb606389556b33d34eb2536459528dc0af97adbcd0ce273aeb650f598d4b2",
|
||||
"4def7a7e5464a140ae9c3a80279fbebce4bd00f9faad819ab7e001512f67a10d",
|
||||
"d9c017dbe355f318d036469eb9b5fbe129fc2b5786a9dc6746a516eab6fe0126"
|
||||
};
|
||||
|
||||
const char *SKEIN512_TestOutput[MDTESTCOUNT] = {
|
||||
"bc5b4c50925519c290cc634277ae3d6257212395cba733bbad37a4af0fa06af41fca7903d06564fea7a2d3730dbdb80c1f85562dfcc070334ea4d1d9e72cba7a",
|
||||
"b1cd8d33f61b3737adfd59bb13ad82f4a9548e92f22956a8976cca3fdb7fee4fe91698146c4197cec85d38b83c5d93bdba92c01fd9a53870d0c7f967bc62bdce",
|
||||
"8f5dd9ec798152668e35129496b029a960c9a9b88662f7f9482f110b31f9f93893ecfb25c009baad9e46737197d5630379816a886aa05526d3a70df272d96e75",
|
||||
"15b73c158ffb875fed4d72801ded0794c720b121c0c78edf45f900937e6933d9e21a3a984206933d504b5dbb2368000411477ee1b204c986068df77886542fcc",
|
||||
"23793ad900ef12f9165c8080da6fdfd2c8354a2929b8aadf83aa82a3c6470342f57cf8c035ec0d97429b626c4d94f28632c8f5134fd367dca5cf293d2ec13f8c",
|
||||
"0c6bed927e022f5ddcf81877d42e5f75798a9f8fd3ede3d83baac0a2f364b082e036c11af35fe478745459dd8f5c0b73efe3c56ba5bb2009208d5a29cc6e469c",
|
||||
"2ca9fcffb3456f297d1b5f407014ecb856f0baac8eb540f534b1f187196f21e88f31103128c2f03fcc9857d7a58eb66f9525e2302d88833ee069295537a434ce",
|
||||
"1131f2aaa0e97126c9314f9f968cc827259bbfabced2943bb8c9274448998fb3b78738b4580dd500c76105fd3c03e465e1414f2c29664286b1f79d3e51128125"
|
||||
};
|
||||
|
||||
const char *SKEIN1024_TestOutput[MDTESTCOUNT] = {
|
||||
"0fff9563bb3279289227ac77d319b6fff8d7e9f09da1247b72a0a265cd6d2a62645ad547ed8193db48cff847c06494a03f55666d3b47eb4c20456c9373c86297d630d5578ebd34cb40991578f9f52b18003efa35d3da6553ff35db91b81ab890bec1b189b7f52cb2a783ebb7d823d725b0b4a71f6824e88f68f982eefc6d19c6",
|
||||
"6ab4c4ba9814a3d976ec8bffa7fcc638ceba0544a97b3c98411323ffd2dc936315d13dc93c13c4e88cda6f5bac6f2558b2d8694d3b6143e40d644ae43ca940685cb37f809d3d0550c56cba8036dee729a4f8fb960732e59e64d57f7f7710f8670963cdcdc95b41daab4855fcf8b6762a64b173ee61343a2c7689af1d293eba97",
|
||||
"35a599a0f91abcdb4cb73c19b8cb8d947742d82c309137a7caed29e8e0a2ca7a9ff9a90c34c1908cc7e7fd99bb15032fb86e76df21b72628399b5f7c3cc209d7bb31c99cd4e19465622a049afbb87c03b5ce3888d17e6e667279ec0aa9b3e2712624c01b5f5bbe1a564220bdcf6990af0c2539019f313fdd7406cca3892a1f1f",
|
||||
"ea891f5268acd0fac97467fc1aa89d1ce8681a9992a42540e53babee861483110c2d16f49e73bac27653ff173003e40cfb08516cd34262e6af95a5d8645c9c1abb3e813604d508b8511b30f9a5c1b352aa0791c7d2f27b2706dccea54bc7de6555b5202351751c3299f97c09cf89c40f67187e2521c0fad82b30edbb224f0458",
|
||||
"f23d95c2a25fbcd0e797cd058fec39d3c52d2b5afd7a9af1df934e63257d1d3dcf3246e7329c0f1104c1e51e3d22e300507b0c3b9f985bb1f645ef49835080536becf83788e17fed09c9982ba65c3cb7ffe6a5f745b911c506962adf226e435c42f6f6bc08d288f9c810e807e3216ef444f3db22744441deefa4900982a1371f",
|
||||
"cf3889e8a8d11bfd3938055d7d061437962bc5eac8ae83b1b71c94be201b8cf657fdbfc38674997a008c0c903f56a23feb3ae30e012377f1cfa080a9ca7fe8b96138662653fb3335c7d06595bf8baf65e215307532094cfdfa056bd8052ab792a3944a2adaa47b30335b8badb8fe9eb94fe329cdca04e58bbc530f0af709f469",
|
||||
"cf21a613620e6c119eca31fdfaad449a8e02f95ca256c21d2a105f8e4157048f9fe1e897893ea18b64e0e37cb07d5ac947f27ba544caf7cbc1ad094e675aed77a366270f7eb7f46543bccfa61c526fd628408058ed00ed566ac35a9761d002e629c4fb0d430b2f4ad016fcc49c44d2981c4002da0eecc42144160e2eaea4855a",
|
||||
"e6799b78db54085a2be7ff4c8007f147fa88d326abab30be0560b953396d8802feee9a15419b48a467574e9283be15685ca8a079ee52b27166b64dd70b124b1d4e4f6aca37224c3f2685e67e67baef9f94b905698adc794a09672aba977a61b20966912acdb08c21a2c37001785355dc884751a21f848ab36e590331ff938138"
|
||||
};
|
||||
|
||||
static void
|
||||
MDTestSuite(const Algorithm_t *alg)
|
||||
{
|
||||
|
1328
sys/crypto/skein/amd64/skein_block_asm.s
Normal file
1328
sys/crypto/skein/amd64/skein_block_asm.s
Normal file
File diff suppressed because it is too large
Load Diff
858
sys/crypto/skein/skein.c
Normal file
858
sys/crypto/skein/skein.c
Normal file
@ -0,0 +1,858 @@
|
||||
/***********************************************************************
|
||||
**
|
||||
** Implementation of the Skein hash function.
|
||||
**
|
||||
** Source code author: Doug Whiting, 2008.
|
||||
**
|
||||
** This algorithm and source code is released to the public domain.
|
||||
**
|
||||
************************************************************************/
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
__FBSDID("$FreeBSD$");
|
||||
|
||||
#include <sys/endian.h>
|
||||
#include <sys/types.h>
|
||||
|
||||
/* get the memcpy/memset functions */
|
||||
#ifdef _KERNEL
|
||||
#include <sys/systm.h>
|
||||
#else
|
||||
#include <string.h>
|
||||
#endif
|
||||
|
||||
#define SKEIN_PORT_CODE /* instantiate any code in skein_port.h */
|
||||
|
||||
#include "skein.h" /* get the Skein API definitions */
|
||||
#include "skein_iv.h" /* get precomputed IVs */
|
||||
|
||||
/*****************************************************************/
|
||||
/* External function to process blkCnt (nonzero) full block(s) of data. */
|
||||
void Skein_256_Process_Block(Skein_256_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd);
|
||||
void Skein_512_Process_Block(Skein_512_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd);
|
||||
void Skein1024_Process_Block(Skein1024_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd);
|
||||
|
||||
/*****************************************************************/
|
||||
/* 256-bit Skein */
|
||||
/*****************************************************************/
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* init the context for a straight hashing operation */
|
||||
int Skein_256_Init(Skein_256_Ctxt_t *ctx, size_t hashBitLen)
|
||||
{
|
||||
union
|
||||
{
|
||||
u08b_t b[SKEIN_256_STATE_BYTES];
|
||||
u64b_t w[SKEIN_256_STATE_WORDS];
|
||||
} cfg; /* config block */
|
||||
|
||||
Skein_Assert(hashBitLen > 0,SKEIN_BAD_HASHLEN);
|
||||
ctx->h.hashBitLen = hashBitLen; /* output hash bit count */
|
||||
|
||||
switch (hashBitLen)
|
||||
{ /* use pre-computed values, where available */
|
||||
#ifndef SKEIN_NO_PRECOMP
|
||||
case 256: memcpy(ctx->X,SKEIN_256_IV_256,sizeof(ctx->X)); break;
|
||||
case 224: memcpy(ctx->X,SKEIN_256_IV_224,sizeof(ctx->X)); break;
|
||||
case 160: memcpy(ctx->X,SKEIN_256_IV_160,sizeof(ctx->X)); break;
|
||||
case 128: memcpy(ctx->X,SKEIN_256_IV_128,sizeof(ctx->X)); break;
|
||||
#endif
|
||||
default:
|
||||
/* here if there is no precomputed IV value available */
|
||||
/* build/process the config block, type == CONFIG (could be precomputed) */
|
||||
Skein_Start_New_Type(ctx,CFG_FINAL); /* set tweaks: T0=0; T1=CFG | FINAL */
|
||||
|
||||
cfg.w[0] = Skein_Swap64(SKEIN_SCHEMA_VER); /* set the schema, version */
|
||||
cfg.w[1] = Skein_Swap64(hashBitLen); /* hash result length in bits */
|
||||
cfg.w[2] = Skein_Swap64(SKEIN_CFG_TREE_INFO_SEQUENTIAL);
|
||||
memset(&cfg.w[3],0,sizeof(cfg) - 3*sizeof(cfg.w[0])); /* zero pad config block */
|
||||
|
||||
/* compute the initial chaining values from config block */
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* zero the chaining variables */
|
||||
Skein_256_Process_Block(ctx,cfg.b,1,SKEIN_CFG_STR_LEN);
|
||||
break;
|
||||
}
|
||||
/* The chaining vars ctx->X are now initialized for the given hashBitLen. */
|
||||
/* Set up to process the data message portion of the hash (default) */
|
||||
Skein_Start_New_Type(ctx,MSG); /* T0=0, T1= MSG type */
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* init the context for a MAC and/or tree hash operation */
|
||||
/* [identical to Skein_256_Init() when keyBytes == 0 && treeInfo == SKEIN_CFG_TREE_INFO_SEQUENTIAL] */
|
||||
int Skein_256_InitExt(Skein_256_Ctxt_t *ctx,size_t hashBitLen,u64b_t treeInfo, const u08b_t *key, size_t keyBytes)
|
||||
{
|
||||
union
|
||||
{
|
||||
u08b_t b[SKEIN_256_STATE_BYTES];
|
||||
u64b_t w[SKEIN_256_STATE_WORDS];
|
||||
} cfg; /* config block */
|
||||
|
||||
Skein_Assert(hashBitLen > 0,SKEIN_BAD_HASHLEN);
|
||||
Skein_Assert(keyBytes == 0 || key != NULL,SKEIN_FAIL);
|
||||
|
||||
/* compute the initial chaining values ctx->X[], based on key */
|
||||
if (keyBytes == 0) /* is there a key? */
|
||||
{
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* no key: use all zeroes as key for config block */
|
||||
}
|
||||
else /* here to pre-process a key */
|
||||
{
|
||||
Skein_assert(sizeof(cfg.b) >= sizeof(ctx->X));
|
||||
/* do a mini-Init right here */
|
||||
ctx->h.hashBitLen=8*sizeof(ctx->X); /* set output hash bit count = state size */
|
||||
Skein_Start_New_Type(ctx,KEY); /* set tweaks: T0 = 0; T1 = KEY type */
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* zero the initial chaining variables */
|
||||
Skein_256_Update(ctx,key,keyBytes); /* hash the key */
|
||||
Skein_256_Final_Pad(ctx,cfg.b); /* put result into cfg.b[] */
|
||||
memcpy(ctx->X,cfg.b,sizeof(cfg.b)); /* copy over into ctx->X[] */
|
||||
#if SKEIN_NEED_SWAP
|
||||
{
|
||||
uint_t i;
|
||||
for (i=0;i<SKEIN_256_STATE_WORDS;i++) /* convert key bytes to context words */
|
||||
ctx->X[i] = Skein_Swap64(ctx->X[i]);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
/* build/process the config block, type == CONFIG (could be precomputed for each key) */
|
||||
ctx->h.hashBitLen = hashBitLen; /* output hash bit count */
|
||||
Skein_Start_New_Type(ctx,CFG_FINAL);
|
||||
|
||||
memset(&cfg.w,0,sizeof(cfg.w)); /* pre-pad cfg.w[] with zeroes */
|
||||
cfg.w[0] = Skein_Swap64(SKEIN_SCHEMA_VER);
|
||||
cfg.w[1] = Skein_Swap64(hashBitLen); /* hash result length in bits */
|
||||
cfg.w[2] = Skein_Swap64(treeInfo); /* tree hash config info (or SKEIN_CFG_TREE_INFO_SEQUENTIAL) */
|
||||
|
||||
Skein_Show_Key(256,&ctx->h,key,keyBytes);
|
||||
|
||||
/* compute the initial chaining values from config block */
|
||||
Skein_256_Process_Block(ctx,cfg.b,1,SKEIN_CFG_STR_LEN);
|
||||
|
||||
/* The chaining vars ctx->X are now initialized */
|
||||
/* Set up to process the data message portion of the hash (default) */
|
||||
ctx->h.bCnt = 0; /* buffer b[] starts out empty */
|
||||
Skein_Start_New_Type(ctx,MSG);
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* process the input bytes */
|
||||
int Skein_256_Update(Skein_256_Ctxt_t *ctx, const u08b_t *msg, size_t msgByteCnt)
|
||||
{
|
||||
size_t n;
|
||||
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_256_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
/* process full blocks, if any */
|
||||
if (msgByteCnt + ctx->h.bCnt > SKEIN_256_BLOCK_BYTES)
|
||||
{
|
||||
if (ctx->h.bCnt) /* finish up any buffered message data */
|
||||
{
|
||||
n = SKEIN_256_BLOCK_BYTES - ctx->h.bCnt; /* # bytes free in buffer b[] */
|
||||
if (n)
|
||||
{
|
||||
Skein_assert(n < msgByteCnt); /* check on our logic here */
|
||||
memcpy(&ctx->b[ctx->h.bCnt],msg,n);
|
||||
msgByteCnt -= n;
|
||||
msg += n;
|
||||
ctx->h.bCnt += n;
|
||||
}
|
||||
Skein_assert(ctx->h.bCnt == SKEIN_256_BLOCK_BYTES);
|
||||
Skein_256_Process_Block(ctx,ctx->b,1,SKEIN_256_BLOCK_BYTES);
|
||||
ctx->h.bCnt = 0;
|
||||
}
|
||||
/* now process any remaining full blocks, directly from input message data */
|
||||
if (msgByteCnt > SKEIN_256_BLOCK_BYTES)
|
||||
{
|
||||
n = (msgByteCnt-1) / SKEIN_256_BLOCK_BYTES; /* number of full blocks to process */
|
||||
Skein_256_Process_Block(ctx,msg,n,SKEIN_256_BLOCK_BYTES);
|
||||
msgByteCnt -= n * SKEIN_256_BLOCK_BYTES;
|
||||
msg += n * SKEIN_256_BLOCK_BYTES;
|
||||
}
|
||||
Skein_assert(ctx->h.bCnt == 0);
|
||||
}
|
||||
|
||||
/* copy any remaining source message data bytes into b[] */
|
||||
if (msgByteCnt)
|
||||
{
|
||||
Skein_assert(msgByteCnt + ctx->h.bCnt <= SKEIN_256_BLOCK_BYTES);
|
||||
memcpy(&ctx->b[ctx->h.bCnt],msg,msgByteCnt);
|
||||
ctx->h.bCnt += msgByteCnt;
|
||||
}
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* finalize the hash computation and output the result */
|
||||
int Skein_256_Final(Skein_256_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
size_t i,n,byteCnt;
|
||||
u64b_t X[SKEIN_256_STATE_WORDS];
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_256_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
ctx->h.T[1] |= SKEIN_T1_FLAG_FINAL; /* tag as the final block */
|
||||
if (ctx->h.bCnt < SKEIN_256_BLOCK_BYTES) /* zero pad b[] if necessary */
|
||||
memset(&ctx->b[ctx->h.bCnt],0,SKEIN_256_BLOCK_BYTES - ctx->h.bCnt);
|
||||
|
||||
Skein_256_Process_Block(ctx,ctx->b,1,ctx->h.bCnt); /* process the final block */
|
||||
|
||||
/* now output the result */
|
||||
byteCnt = (ctx->h.hashBitLen + 7) >> 3; /* total number of output bytes */
|
||||
|
||||
/* run Threefish in "counter mode" to generate output */
|
||||
memset(ctx->b,0,sizeof(ctx->b)); /* zero out b[], so it can hold the counter */
|
||||
memcpy(X,ctx->X,sizeof(X)); /* keep a local copy of counter mode "key" */
|
||||
for (i=0;i*SKEIN_256_BLOCK_BYTES < byteCnt;i++)
|
||||
{
|
||||
((u64b_t *)ctx->b)[0]= Skein_Swap64((u64b_t) i); /* build the counter block */
|
||||
Skein_Start_New_Type(ctx,OUT_FINAL);
|
||||
Skein_256_Process_Block(ctx,ctx->b,1,sizeof(u64b_t)); /* run "counter mode" */
|
||||
n = byteCnt - i*SKEIN_256_BLOCK_BYTES; /* number of output bytes left to go */
|
||||
if (n >= SKEIN_256_BLOCK_BYTES)
|
||||
n = SKEIN_256_BLOCK_BYTES;
|
||||
Skein_Put64_LSB_First(hashVal+i*SKEIN_256_BLOCK_BYTES,ctx->X,n); /* "output" the ctr mode bytes */
|
||||
Skein_Show_Final(256,&ctx->h,n,hashVal+i*SKEIN_256_BLOCK_BYTES);
|
||||
memcpy(ctx->X,X,sizeof(X)); /* restore the counter mode key for next time */
|
||||
}
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
#if defined(SKEIN_CODE_SIZE) || defined(SKEIN_PERF)
|
||||
size_t Skein_256_API_CodeSize(void)
|
||||
{
|
||||
return ((u08b_t *) Skein_256_API_CodeSize) -
|
||||
((u08b_t *) Skein_256_Init);
|
||||
}
|
||||
#endif
|
||||
|
||||
/*****************************************************************/
|
||||
/* 512-bit Skein */
|
||||
/*****************************************************************/
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* init the context for a straight hashing operation */
|
||||
int Skein_512_Init(Skein_512_Ctxt_t *ctx, size_t hashBitLen)
|
||||
{
|
||||
union
|
||||
{
|
||||
u08b_t b[SKEIN_512_STATE_BYTES];
|
||||
u64b_t w[SKEIN_512_STATE_WORDS];
|
||||
} cfg; /* config block */
|
||||
|
||||
Skein_Assert(hashBitLen > 0,SKEIN_BAD_HASHLEN);
|
||||
ctx->h.hashBitLen = hashBitLen; /* output hash bit count */
|
||||
|
||||
switch (hashBitLen)
|
||||
{ /* use pre-computed values, where available */
|
||||
#ifndef SKEIN_NO_PRECOMP
|
||||
case 512: memcpy(ctx->X,SKEIN_512_IV_512,sizeof(ctx->X)); break;
|
||||
case 384: memcpy(ctx->X,SKEIN_512_IV_384,sizeof(ctx->X)); break;
|
||||
case 256: memcpy(ctx->X,SKEIN_512_IV_256,sizeof(ctx->X)); break;
|
||||
case 224: memcpy(ctx->X,SKEIN_512_IV_224,sizeof(ctx->X)); break;
|
||||
#endif
|
||||
default:
|
||||
/* here if there is no precomputed IV value available */
|
||||
/* build/process the config block, type == CONFIG (could be precomputed) */
|
||||
Skein_Start_New_Type(ctx,CFG_FINAL); /* set tweaks: T0=0; T1=CFG | FINAL */
|
||||
|
||||
cfg.w[0] = Skein_Swap64(SKEIN_SCHEMA_VER); /* set the schema, version */
|
||||
cfg.w[1] = Skein_Swap64(hashBitLen); /* hash result length in bits */
|
||||
cfg.w[2] = Skein_Swap64(SKEIN_CFG_TREE_INFO_SEQUENTIAL);
|
||||
memset(&cfg.w[3],0,sizeof(cfg) - 3*sizeof(cfg.w[0])); /* zero pad config block */
|
||||
|
||||
/* compute the initial chaining values from config block */
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* zero the chaining variables */
|
||||
Skein_512_Process_Block(ctx,cfg.b,1,SKEIN_CFG_STR_LEN);
|
||||
break;
|
||||
}
|
||||
|
||||
/* The chaining vars ctx->X are now initialized for the given hashBitLen. */
|
||||
/* Set up to process the data message portion of the hash (default) */
|
||||
Skein_Start_New_Type(ctx,MSG); /* T0=0, T1= MSG type */
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* init the context for a MAC and/or tree hash operation */
|
||||
/* [identical to Skein_512_Init() when keyBytes == 0 && treeInfo == SKEIN_CFG_TREE_INFO_SEQUENTIAL] */
|
||||
int Skein_512_InitExt(Skein_512_Ctxt_t *ctx,size_t hashBitLen,u64b_t treeInfo, const u08b_t *key, size_t keyBytes)
|
||||
{
|
||||
union
|
||||
{
|
||||
u08b_t b[SKEIN_512_STATE_BYTES];
|
||||
u64b_t w[SKEIN_512_STATE_WORDS];
|
||||
} cfg; /* config block */
|
||||
|
||||
Skein_Assert(hashBitLen > 0,SKEIN_BAD_HASHLEN);
|
||||
Skein_Assert(keyBytes == 0 || key != NULL,SKEIN_FAIL);
|
||||
|
||||
/* compute the initial chaining values ctx->X[], based on key */
|
||||
if (keyBytes == 0) /* is there a key? */
|
||||
{
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* no key: use all zeroes as key for config block */
|
||||
}
|
||||
else /* here to pre-process a key */
|
||||
{
|
||||
Skein_assert(sizeof(cfg.b) >= sizeof(ctx->X));
|
||||
/* do a mini-Init right here */
|
||||
ctx->h.hashBitLen=8*sizeof(ctx->X); /* set output hash bit count = state size */
|
||||
Skein_Start_New_Type(ctx,KEY); /* set tweaks: T0 = 0; T1 = KEY type */
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* zero the initial chaining variables */
|
||||
Skein_512_Update(ctx,key,keyBytes); /* hash the key */
|
||||
Skein_512_Final_Pad(ctx,cfg.b); /* put result into cfg.b[] */
|
||||
memcpy(ctx->X,cfg.b,sizeof(cfg.b)); /* copy over into ctx->X[] */
|
||||
#if SKEIN_NEED_SWAP
|
||||
{
|
||||
uint_t i;
|
||||
for (i=0;i<SKEIN_512_STATE_WORDS;i++) /* convert key bytes to context words */
|
||||
ctx->X[i] = Skein_Swap64(ctx->X[i]);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
/* build/process the config block, type == CONFIG (could be precomputed for each key) */
|
||||
ctx->h.hashBitLen = hashBitLen; /* output hash bit count */
|
||||
Skein_Start_New_Type(ctx,CFG_FINAL);
|
||||
|
||||
memset(&cfg.w,0,sizeof(cfg.w)); /* pre-pad cfg.w[] with zeroes */
|
||||
cfg.w[0] = Skein_Swap64(SKEIN_SCHEMA_VER);
|
||||
cfg.w[1] = Skein_Swap64(hashBitLen); /* hash result length in bits */
|
||||
cfg.w[2] = Skein_Swap64(treeInfo); /* tree hash config info (or SKEIN_CFG_TREE_INFO_SEQUENTIAL) */
|
||||
|
||||
Skein_Show_Key(512,&ctx->h,key,keyBytes);
|
||||
|
||||
/* compute the initial chaining values from config block */
|
||||
Skein_512_Process_Block(ctx,cfg.b,1,SKEIN_CFG_STR_LEN);
|
||||
|
||||
/* The chaining vars ctx->X are now initialized */
|
||||
/* Set up to process the data message portion of the hash (default) */
|
||||
ctx->h.bCnt = 0; /* buffer b[] starts out empty */
|
||||
Skein_Start_New_Type(ctx,MSG);
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* process the input bytes */
|
||||
int Skein_512_Update(Skein_512_Ctxt_t *ctx, const u08b_t *msg, size_t msgByteCnt)
|
||||
{
|
||||
size_t n;
|
||||
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_512_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
/* process full blocks, if any */
|
||||
if (msgByteCnt + ctx->h.bCnt > SKEIN_512_BLOCK_BYTES)
|
||||
{
|
||||
if (ctx->h.bCnt) /* finish up any buffered message data */
|
||||
{
|
||||
n = SKEIN_512_BLOCK_BYTES - ctx->h.bCnt; /* # bytes free in buffer b[] */
|
||||
if (n)
|
||||
{
|
||||
Skein_assert(n < msgByteCnt); /* check on our logic here */
|
||||
memcpy(&ctx->b[ctx->h.bCnt],msg,n);
|
||||
msgByteCnt -= n;
|
||||
msg += n;
|
||||
ctx->h.bCnt += n;
|
||||
}
|
||||
Skein_assert(ctx->h.bCnt == SKEIN_512_BLOCK_BYTES);
|
||||
Skein_512_Process_Block(ctx,ctx->b,1,SKEIN_512_BLOCK_BYTES);
|
||||
ctx->h.bCnt = 0;
|
||||
}
|
||||
/* now process any remaining full blocks, directly from input message data */
|
||||
if (msgByteCnt > SKEIN_512_BLOCK_BYTES)
|
||||
{
|
||||
n = (msgByteCnt-1) / SKEIN_512_BLOCK_BYTES; /* number of full blocks to process */
|
||||
Skein_512_Process_Block(ctx,msg,n,SKEIN_512_BLOCK_BYTES);
|
||||
msgByteCnt -= n * SKEIN_512_BLOCK_BYTES;
|
||||
msg += n * SKEIN_512_BLOCK_BYTES;
|
||||
}
|
||||
Skein_assert(ctx->h.bCnt == 0);
|
||||
}
|
||||
|
||||
/* copy any remaining source message data bytes into b[] */
|
||||
if (msgByteCnt)
|
||||
{
|
||||
Skein_assert(msgByteCnt + ctx->h.bCnt <= SKEIN_512_BLOCK_BYTES);
|
||||
memcpy(&ctx->b[ctx->h.bCnt],msg,msgByteCnt);
|
||||
ctx->h.bCnt += msgByteCnt;
|
||||
}
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* finalize the hash computation and output the result */
|
||||
int Skein_512_Final(Skein_512_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
size_t i,n,byteCnt;
|
||||
u64b_t X[SKEIN_512_STATE_WORDS];
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_512_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
ctx->h.T[1] |= SKEIN_T1_FLAG_FINAL; /* tag as the final block */
|
||||
if (ctx->h.bCnt < SKEIN_512_BLOCK_BYTES) /* zero pad b[] if necessary */
|
||||
memset(&ctx->b[ctx->h.bCnt],0,SKEIN_512_BLOCK_BYTES - ctx->h.bCnt);
|
||||
|
||||
Skein_512_Process_Block(ctx,ctx->b,1,ctx->h.bCnt); /* process the final block */
|
||||
|
||||
/* now output the result */
|
||||
byteCnt = (ctx->h.hashBitLen + 7) >> 3; /* total number of output bytes */
|
||||
|
||||
/* run Threefish in "counter mode" to generate output */
|
||||
memset(ctx->b,0,sizeof(ctx->b)); /* zero out b[], so it can hold the counter */
|
||||
memcpy(X,ctx->X,sizeof(X)); /* keep a local copy of counter mode "key" */
|
||||
for (i=0;i*SKEIN_512_BLOCK_BYTES < byteCnt;i++)
|
||||
{
|
||||
((u64b_t *)ctx->b)[0]= Skein_Swap64((u64b_t) i); /* build the counter block */
|
||||
Skein_Start_New_Type(ctx,OUT_FINAL);
|
||||
Skein_512_Process_Block(ctx,ctx->b,1,sizeof(u64b_t)); /* run "counter mode" */
|
||||
n = byteCnt - i*SKEIN_512_BLOCK_BYTES; /* number of output bytes left to go */
|
||||
if (n >= SKEIN_512_BLOCK_BYTES)
|
||||
n = SKEIN_512_BLOCK_BYTES;
|
||||
Skein_Put64_LSB_First(hashVal+i*SKEIN_512_BLOCK_BYTES,ctx->X,n); /* "output" the ctr mode bytes */
|
||||
Skein_Show_Final(512,&ctx->h,n,hashVal+i*SKEIN_512_BLOCK_BYTES);
|
||||
memcpy(ctx->X,X,sizeof(X)); /* restore the counter mode key for next time */
|
||||
}
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
#if defined(SKEIN_CODE_SIZE) || defined(SKEIN_PERF)
|
||||
size_t Skein_512_API_CodeSize(void)
|
||||
{
|
||||
return ((u08b_t *) Skein_512_API_CodeSize) -
|
||||
((u08b_t *) Skein_512_Init);
|
||||
}
|
||||
#endif
|
||||
|
||||
/*****************************************************************/
|
||||
/* 1024-bit Skein */
|
||||
/*****************************************************************/
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* init the context for a straight hashing operation */
|
||||
int Skein1024_Init(Skein1024_Ctxt_t *ctx, size_t hashBitLen)
|
||||
{
|
||||
union
|
||||
{
|
||||
u08b_t b[SKEIN1024_STATE_BYTES];
|
||||
u64b_t w[SKEIN1024_STATE_WORDS];
|
||||
} cfg; /* config block */
|
||||
|
||||
Skein_Assert(hashBitLen > 0,SKEIN_BAD_HASHLEN);
|
||||
ctx->h.hashBitLen = hashBitLen; /* output hash bit count */
|
||||
|
||||
switch (hashBitLen)
|
||||
{ /* use pre-computed values, where available */
|
||||
#ifndef SKEIN_NO_PRECOMP
|
||||
case 512: memcpy(ctx->X,SKEIN1024_IV_512 ,sizeof(ctx->X)); break;
|
||||
case 384: memcpy(ctx->X,SKEIN1024_IV_384 ,sizeof(ctx->X)); break;
|
||||
case 1024: memcpy(ctx->X,SKEIN1024_IV_1024,sizeof(ctx->X)); break;
|
||||
#endif
|
||||
default:
|
||||
/* here if there is no precomputed IV value available */
|
||||
/* build/process the config block, type == CONFIG (could be precomputed) */
|
||||
Skein_Start_New_Type(ctx,CFG_FINAL); /* set tweaks: T0=0; T1=CFG | FINAL */
|
||||
|
||||
cfg.w[0] = Skein_Swap64(SKEIN_SCHEMA_VER); /* set the schema, version */
|
||||
cfg.w[1] = Skein_Swap64(hashBitLen); /* hash result length in bits */
|
||||
cfg.w[2] = Skein_Swap64(SKEIN_CFG_TREE_INFO_SEQUENTIAL);
|
||||
memset(&cfg.w[3],0,sizeof(cfg) - 3*sizeof(cfg.w[0])); /* zero pad config block */
|
||||
|
||||
/* compute the initial chaining values from config block */
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* zero the chaining variables */
|
||||
Skein1024_Process_Block(ctx,cfg.b,1,SKEIN_CFG_STR_LEN);
|
||||
break;
|
||||
}
|
||||
|
||||
/* The chaining vars ctx->X are now initialized for the given hashBitLen. */
|
||||
/* Set up to process the data message portion of the hash (default) */
|
||||
Skein_Start_New_Type(ctx,MSG); /* T0=0, T1= MSG type */
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* init the context for a MAC and/or tree hash operation */
|
||||
/* [identical to Skein1024_Init() when keyBytes == 0 && treeInfo == SKEIN_CFG_TREE_INFO_SEQUENTIAL] */
|
||||
int Skein1024_InitExt(Skein1024_Ctxt_t *ctx,size_t hashBitLen,u64b_t treeInfo, const u08b_t *key, size_t keyBytes)
|
||||
{
|
||||
union
|
||||
{
|
||||
u08b_t b[SKEIN1024_STATE_BYTES];
|
||||
u64b_t w[SKEIN1024_STATE_WORDS];
|
||||
} cfg; /* config block */
|
||||
|
||||
Skein_Assert(hashBitLen > 0,SKEIN_BAD_HASHLEN);
|
||||
Skein_Assert(keyBytes == 0 || key != NULL,SKEIN_FAIL);
|
||||
|
||||
/* compute the initial chaining values ctx->X[], based on key */
|
||||
if (keyBytes == 0) /* is there a key? */
|
||||
{
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* no key: use all zeroes as key for config block */
|
||||
}
|
||||
else /* here to pre-process a key */
|
||||
{
|
||||
Skein_assert(sizeof(cfg.b) >= sizeof(ctx->X));
|
||||
/* do a mini-Init right here */
|
||||
ctx->h.hashBitLen=8*sizeof(ctx->X); /* set output hash bit count = state size */
|
||||
Skein_Start_New_Type(ctx,KEY); /* set tweaks: T0 = 0; T1 = KEY type */
|
||||
memset(ctx->X,0,sizeof(ctx->X)); /* zero the initial chaining variables */
|
||||
Skein1024_Update(ctx,key,keyBytes); /* hash the key */
|
||||
Skein1024_Final_Pad(ctx,cfg.b); /* put result into cfg.b[] */
|
||||
memcpy(ctx->X,cfg.b,sizeof(cfg.b)); /* copy over into ctx->X[] */
|
||||
#if SKEIN_NEED_SWAP
|
||||
{
|
||||
uint_t i;
|
||||
for (i=0;i<SKEIN1024_STATE_WORDS;i++) /* convert key bytes to context words */
|
||||
ctx->X[i] = Skein_Swap64(ctx->X[i]);
|
||||
}
|
||||
#endif
|
||||
}
|
||||
/* build/process the config block, type == CONFIG (could be precomputed for each key) */
|
||||
ctx->h.hashBitLen = hashBitLen; /* output hash bit count */
|
||||
Skein_Start_New_Type(ctx,CFG_FINAL);
|
||||
|
||||
memset(&cfg.w,0,sizeof(cfg.w)); /* pre-pad cfg.w[] with zeroes */
|
||||
cfg.w[0] = Skein_Swap64(SKEIN_SCHEMA_VER);
|
||||
cfg.w[1] = Skein_Swap64(hashBitLen); /* hash result length in bits */
|
||||
cfg.w[2] = Skein_Swap64(treeInfo); /* tree hash config info (or SKEIN_CFG_TREE_INFO_SEQUENTIAL) */
|
||||
|
||||
Skein_Show_Key(1024,&ctx->h,key,keyBytes);
|
||||
|
||||
/* compute the initial chaining values from config block */
|
||||
Skein1024_Process_Block(ctx,cfg.b,1,SKEIN_CFG_STR_LEN);
|
||||
|
||||
/* The chaining vars ctx->X are now initialized */
|
||||
/* Set up to process the data message portion of the hash (default) */
|
||||
ctx->h.bCnt = 0; /* buffer b[] starts out empty */
|
||||
Skein_Start_New_Type(ctx,MSG);
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* process the input bytes */
|
||||
int Skein1024_Update(Skein1024_Ctxt_t *ctx, const u08b_t *msg, size_t msgByteCnt)
|
||||
{
|
||||
size_t n;
|
||||
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN1024_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
/* process full blocks, if any */
|
||||
if (msgByteCnt + ctx->h.bCnt > SKEIN1024_BLOCK_BYTES)
|
||||
{
|
||||
if (ctx->h.bCnt) /* finish up any buffered message data */
|
||||
{
|
||||
n = SKEIN1024_BLOCK_BYTES - ctx->h.bCnt; /* # bytes free in buffer b[] */
|
||||
if (n)
|
||||
{
|
||||
Skein_assert(n < msgByteCnt); /* check on our logic here */
|
||||
memcpy(&ctx->b[ctx->h.bCnt],msg,n);
|
||||
msgByteCnt -= n;
|
||||
msg += n;
|
||||
ctx->h.bCnt += n;
|
||||
}
|
||||
Skein_assert(ctx->h.bCnt == SKEIN1024_BLOCK_BYTES);
|
||||
Skein1024_Process_Block(ctx,ctx->b,1,SKEIN1024_BLOCK_BYTES);
|
||||
ctx->h.bCnt = 0;
|
||||
}
|
||||
/* now process any remaining full blocks, directly from input message data */
|
||||
if (msgByteCnt > SKEIN1024_BLOCK_BYTES)
|
||||
{
|
||||
n = (msgByteCnt-1) / SKEIN1024_BLOCK_BYTES; /* number of full blocks to process */
|
||||
Skein1024_Process_Block(ctx,msg,n,SKEIN1024_BLOCK_BYTES);
|
||||
msgByteCnt -= n * SKEIN1024_BLOCK_BYTES;
|
||||
msg += n * SKEIN1024_BLOCK_BYTES;
|
||||
}
|
||||
Skein_assert(ctx->h.bCnt == 0);
|
||||
}
|
||||
|
||||
/* copy any remaining source message data bytes into b[] */
|
||||
if (msgByteCnt)
|
||||
{
|
||||
Skein_assert(msgByteCnt + ctx->h.bCnt <= SKEIN1024_BLOCK_BYTES);
|
||||
memcpy(&ctx->b[ctx->h.bCnt],msg,msgByteCnt);
|
||||
ctx->h.bCnt += msgByteCnt;
|
||||
}
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* finalize the hash computation and output the result */
|
||||
int Skein1024_Final(Skein1024_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
size_t i,n,byteCnt;
|
||||
u64b_t X[SKEIN1024_STATE_WORDS];
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN1024_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
ctx->h.T[1] |= SKEIN_T1_FLAG_FINAL; /* tag as the final block */
|
||||
if (ctx->h.bCnt < SKEIN1024_BLOCK_BYTES) /* zero pad b[] if necessary */
|
||||
memset(&ctx->b[ctx->h.bCnt],0,SKEIN1024_BLOCK_BYTES - ctx->h.bCnt);
|
||||
|
||||
Skein1024_Process_Block(ctx,ctx->b,1,ctx->h.bCnt); /* process the final block */
|
||||
|
||||
/* now output the result */
|
||||
byteCnt = (ctx->h.hashBitLen + 7) >> 3; /* total number of output bytes */
|
||||
|
||||
/* run Threefish in "counter mode" to generate output */
|
||||
memset(ctx->b,0,sizeof(ctx->b)); /* zero out b[], so it can hold the counter */
|
||||
memcpy(X,ctx->X,sizeof(X)); /* keep a local copy of counter mode "key" */
|
||||
for (i=0;i*SKEIN1024_BLOCK_BYTES < byteCnt;i++)
|
||||
{
|
||||
((u64b_t *)ctx->b)[0]= Skein_Swap64((u64b_t) i); /* build the counter block */
|
||||
Skein_Start_New_Type(ctx,OUT_FINAL);
|
||||
Skein1024_Process_Block(ctx,ctx->b,1,sizeof(u64b_t)); /* run "counter mode" */
|
||||
n = byteCnt - i*SKEIN1024_BLOCK_BYTES; /* number of output bytes left to go */
|
||||
if (n >= SKEIN1024_BLOCK_BYTES)
|
||||
n = SKEIN1024_BLOCK_BYTES;
|
||||
Skein_Put64_LSB_First(hashVal+i*SKEIN1024_BLOCK_BYTES,ctx->X,n); /* "output" the ctr mode bytes */
|
||||
Skein_Show_Final(1024,&ctx->h,n,hashVal+i*SKEIN1024_BLOCK_BYTES);
|
||||
memcpy(ctx->X,X,sizeof(X)); /* restore the counter mode key for next time */
|
||||
}
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
#if defined(SKEIN_CODE_SIZE) || defined(SKEIN_PERF)
|
||||
size_t Skein1024_API_CodeSize(void)
|
||||
{
|
||||
return ((u08b_t *) Skein1024_API_CodeSize) -
|
||||
((u08b_t *) Skein1024_Init);
|
||||
}
|
||||
#endif
|
||||
|
||||
/**************** Functions to support MAC/tree hashing ***************/
|
||||
/* (this code is identical for Optimized and Reference versions) */
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* finalize the hash computation and output the block, no OUTPUT stage */
|
||||
int Skein_256_Final_Pad(Skein_256_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_256_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
ctx->h.T[1] |= SKEIN_T1_FLAG_FINAL; /* tag as the final block */
|
||||
if (ctx->h.bCnt < SKEIN_256_BLOCK_BYTES) /* zero pad b[] if necessary */
|
||||
memset(&ctx->b[ctx->h.bCnt],0,SKEIN_256_BLOCK_BYTES - ctx->h.bCnt);
|
||||
Skein_256_Process_Block(ctx,ctx->b,1,ctx->h.bCnt); /* process the final block */
|
||||
|
||||
Skein_Put64_LSB_First(hashVal,ctx->X,SKEIN_256_BLOCK_BYTES); /* "output" the state bytes */
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* finalize the hash computation and output the block, no OUTPUT stage */
|
||||
int Skein_512_Final_Pad(Skein_512_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_512_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
ctx->h.T[1] |= SKEIN_T1_FLAG_FINAL; /* tag as the final block */
|
||||
if (ctx->h.bCnt < SKEIN_512_BLOCK_BYTES) /* zero pad b[] if necessary */
|
||||
memset(&ctx->b[ctx->h.bCnt],0,SKEIN_512_BLOCK_BYTES - ctx->h.bCnt);
|
||||
Skein_512_Process_Block(ctx,ctx->b,1,ctx->h.bCnt); /* process the final block */
|
||||
|
||||
Skein_Put64_LSB_First(hashVal,ctx->X,SKEIN_512_BLOCK_BYTES); /* "output" the state bytes */
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* finalize the hash computation and output the block, no OUTPUT stage */
|
||||
int Skein1024_Final_Pad(Skein1024_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN1024_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
ctx->h.T[1] |= SKEIN_T1_FLAG_FINAL; /* tag as the final block */
|
||||
if (ctx->h.bCnt < SKEIN1024_BLOCK_BYTES) /* zero pad b[] if necessary */
|
||||
memset(&ctx->b[ctx->h.bCnt],0,SKEIN1024_BLOCK_BYTES - ctx->h.bCnt);
|
||||
Skein1024_Process_Block(ctx,ctx->b,1,ctx->h.bCnt); /* process the final block */
|
||||
|
||||
Skein_Put64_LSB_First(hashVal,ctx->X,SKEIN1024_BLOCK_BYTES); /* "output" the state bytes */
|
||||
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
#if SKEIN_TREE_HASH
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* just do the OUTPUT stage */
|
||||
int Skein_256_Output(Skein_256_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
size_t i,n,byteCnt;
|
||||
u64b_t X[SKEIN_256_STATE_WORDS];
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_256_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
/* now output the result */
|
||||
byteCnt = (ctx->h.hashBitLen + 7) >> 3; /* total number of output bytes */
|
||||
|
||||
/* run Threefish in "counter mode" to generate output */
|
||||
memset(ctx->b,0,sizeof(ctx->b)); /* zero out b[], so it can hold the counter */
|
||||
memcpy(X,ctx->X,sizeof(X)); /* keep a local copy of counter mode "key" */
|
||||
for (i=0;i*SKEIN_256_BLOCK_BYTES < byteCnt;i++)
|
||||
{
|
||||
((u64b_t *)ctx->b)[0]= Skein_Swap64((u64b_t) i); /* build the counter block */
|
||||
Skein_Start_New_Type(ctx,OUT_FINAL);
|
||||
Skein_256_Process_Block(ctx,ctx->b,1,sizeof(u64b_t)); /* run "counter mode" */
|
||||
n = byteCnt - i*SKEIN_256_BLOCK_BYTES; /* number of output bytes left to go */
|
||||
if (n >= SKEIN_256_BLOCK_BYTES)
|
||||
n = SKEIN_256_BLOCK_BYTES;
|
||||
Skein_Put64_LSB_First(hashVal+i*SKEIN_256_BLOCK_BYTES,ctx->X,n); /* "output" the ctr mode bytes */
|
||||
Skein_Show_Final(256,&ctx->h,n,hashVal+i*SKEIN_256_BLOCK_BYTES);
|
||||
memcpy(ctx->X,X,sizeof(X)); /* restore the counter mode key for next time */
|
||||
}
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* just do the OUTPUT stage */
|
||||
int Skein_512_Output(Skein_512_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
size_t i,n,byteCnt;
|
||||
u64b_t X[SKEIN_512_STATE_WORDS];
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN_512_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
/* now output the result */
|
||||
byteCnt = (ctx->h.hashBitLen + 7) >> 3; /* total number of output bytes */
|
||||
|
||||
/* run Threefish in "counter mode" to generate output */
|
||||
memset(ctx->b,0,sizeof(ctx->b)); /* zero out b[], so it can hold the counter */
|
||||
memcpy(X,ctx->X,sizeof(X)); /* keep a local copy of counter mode "key" */
|
||||
for (i=0;i*SKEIN_512_BLOCK_BYTES < byteCnt;i++)
|
||||
{
|
||||
((u64b_t *)ctx->b)[0]= Skein_Swap64((u64b_t) i); /* build the counter block */
|
||||
Skein_Start_New_Type(ctx,OUT_FINAL);
|
||||
Skein_512_Process_Block(ctx,ctx->b,1,sizeof(u64b_t)); /* run "counter mode" */
|
||||
n = byteCnt - i*SKEIN_512_BLOCK_BYTES; /* number of output bytes left to go */
|
||||
if (n >= SKEIN_512_BLOCK_BYTES)
|
||||
n = SKEIN_512_BLOCK_BYTES;
|
||||
Skein_Put64_LSB_First(hashVal+i*SKEIN_512_BLOCK_BYTES,ctx->X,n); /* "output" the ctr mode bytes */
|
||||
Skein_Show_Final(256,&ctx->h,n,hashVal+i*SKEIN_512_BLOCK_BYTES);
|
||||
memcpy(ctx->X,X,sizeof(X)); /* restore the counter mode key for next time */
|
||||
}
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
/*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
|
||||
/* just do the OUTPUT stage */
|
||||
int Skein1024_Output(Skein1024_Ctxt_t *ctx, u08b_t *hashVal)
|
||||
{
|
||||
size_t i,n,byteCnt;
|
||||
u64b_t X[SKEIN1024_STATE_WORDS];
|
||||
Skein_Assert(ctx->h.bCnt <= SKEIN1024_BLOCK_BYTES,SKEIN_FAIL); /* catch uninitialized context */
|
||||
|
||||
/* now output the result */
|
||||
byteCnt = (ctx->h.hashBitLen + 7) >> 3; /* total number of output bytes */
|
||||
|
||||
/* run Threefish in "counter mode" to generate output */
|
||||
memset(ctx->b,0,sizeof(ctx->b)); /* zero out b[], so it can hold the counter */
|
||||
memcpy(X,ctx->X,sizeof(X)); /* keep a local copy of counter mode "key" */
|
||||
for (i=0;i*SKEIN1024_BLOCK_BYTES < byteCnt;i++)
|
||||
{
|
||||
((u64b_t *)ctx->b)[0]= Skein_Swap64((u64b_t) i); /* build the counter block */
|
||||
Skein_Start_New_Type(ctx,OUT_FINAL);
|
||||
Skein1024_Process_Block(ctx,ctx->b,1,sizeof(u64b_t)); /* run "counter mode" */
|
||||
n = byteCnt - i*SKEIN1024_BLOCK_BYTES; /* number of output bytes left to go */
|
||||
if (n >= SKEIN1024_BLOCK_BYTES)
|
||||
n = SKEIN1024_BLOCK_BYTES;
|
||||
Skein_Put64_LSB_First(hashVal+i*SKEIN1024_BLOCK_BYTES,ctx->X,n); /* "output" the ctr mode bytes */
|
||||
Skein_Show_Final(256,&ctx->h,n,hashVal+i*SKEIN1024_BLOCK_BYTES);
|
||||
memcpy(ctx->X,X,sizeof(X)); /* restore the counter mode key for next time */
|
||||
}
|
||||
return SKEIN_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
/* Adapt the functions to match the prototype expected by libmd */
|
||||
void
|
||||
SKEIN256_Init(SKEIN256_CTX * ctx)
|
||||
{
|
||||
|
||||
Skein_256_Init(ctx, 256);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN512_Init(SKEIN512_CTX * ctx)
|
||||
{
|
||||
|
||||
Skein_512_Init(ctx, 512);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN1024_Init(SKEIN1024_CTX * ctx)
|
||||
{
|
||||
|
||||
Skein1024_Init(ctx, 1024);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN256_Update(SKEIN256_CTX * ctx, const void *in, size_t len)
|
||||
{
|
||||
|
||||
Skein_256_Update(ctx, in, len);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN512_Update(SKEIN512_CTX * ctx, const void *in, size_t len)
|
||||
{
|
||||
|
||||
Skein_512_Update(ctx, in, len);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN1024_Update(SKEIN1024_CTX * ctx, const void *in, size_t len)
|
||||
{
|
||||
|
||||
Skein1024_Update(ctx, in, len);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN256_Final(unsigned char digest[static SKEIN_256_BLOCK_BYTES], SKEIN256_CTX *ctx)
|
||||
{
|
||||
|
||||
Skein_256_Final(ctx, digest);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN512_Final(unsigned char digest[static SKEIN_512_BLOCK_BYTES], SKEIN512_CTX *ctx)
|
||||
{
|
||||
|
||||
Skein_512_Final(ctx, digest);
|
||||
}
|
||||
|
||||
void
|
||||
SKEIN1024_Final(unsigned char digest[static SKEIN1024_BLOCK_BYTES], SKEIN1024_CTX *ctx)
|
||||
{
|
||||
|
||||
Skein1024_Final(ctx, digest);
|
||||
}
|
||||
|
||||
#ifdef WEAK_REFS
|
||||
/* When building libmd, provide weak references. Note: this is not
|
||||
activated in the context of compiling these sources for internal
|
||||
use in libcrypt.
|
||||
*/
|
||||
#undef SKEIN256_Init
|
||||
__weak_reference(_libmd_SKEIN256_Init, SKEIN256_Init);
|
||||
#undef SKEIN256_Update
|
||||
__weak_reference(_libmd_SKEIN256_Update, SKEIN256_Update);
|
||||
#undef SKEIN256_Final
|
||||
__weak_reference(_libmd_SKEIN256_Final, SKEIN256_Final);
|
||||
|
||||
#undef SKEIN512_Init
|
||||
__weak_reference(_libmd_SKEIN512_Init, SKEIN512_Init);
|
||||
#undef SKEIN512_Update
|
||||
__weak_reference(_libmd_SKEIN512_Update, SKEIN512_Update);
|
||||
#undef SKEIN512_Final
|
||||
__weak_reference(_libmd_SKEIN512_Final, SKEIN512_Final);
|
||||
|
||||
#undef SKEIN1024_Init
|
||||
__weak_reference(_libmd_SKEIN1024_Init, SKEIN1024_Init);
|
||||
#undef SKEIN1024_Update
|
||||
__weak_reference(_libmd_SKEIN1024_Update, SKEIN1024_Update);
|
||||
#undef SKEIN1024_Final
|
||||
__weak_reference(_libmd_SKEIN1024_Final, SKEIN1024_Final);
|
||||
#endif
|
||||
|
||||
#endif
|
333
sys/crypto/skein/skein.h
Normal file
333
sys/crypto/skein/skein.h
Normal file
@ -0,0 +1,333 @@
|
||||
/* $FreeBSD$ */
|
||||
#ifndef _SKEIN_H_
|
||||
#define _SKEIN_H_ 1
|
||||
/**************************************************************************
|
||||
**
|
||||
** Interface declarations and internal definitions for Skein hashing.
|
||||
**
|
||||
** Source code author: Doug Whiting, 2008.
|
||||
**
|
||||
** This algorithm and source code is released to the public domain.
|
||||
**
|
||||
***************************************************************************
|
||||
**
|
||||
** The following compile-time switches may be defined to control some
|
||||
** tradeoffs between speed, code size, error checking, and security.
|
||||
**
|
||||
** The "default" note explains what happens when the switch is not defined.
|
||||
**
|
||||
** SKEIN_DEBUG -- make callouts from inside Skein code
|
||||
** to examine/display intermediate values.
|
||||
** [default: no callouts (no overhead)]
|
||||
**
|
||||
** SKEIN_ERR_CHECK -- how error checking is handled inside Skein
|
||||
** code. If not defined, most error checking
|
||||
** is disabled (for performance). Otherwise,
|
||||
** the switch value is interpreted as:
|
||||
** 0: use assert() to flag errors
|
||||
** 1: return SKEIN_FAIL to flag errors
|
||||
**
|
||||
***************************************************************************/
|
||||
#ifdef __cplusplus
|
||||
extern "C"
|
||||
{
|
||||
#endif
|
||||
|
||||
#ifndef _KERNEL
|
||||
#include <stddef.h> /* get size_t definition */
|
||||
#endif
|
||||
#include "skein_port.h" /* get platform-specific definitions */
|
||||
|
||||
enum
|
||||
{
|
||||
SKEIN_SUCCESS = 0, /* return codes from Skein calls */
|
||||
SKEIN_FAIL = 1,
|
||||
SKEIN_BAD_HASHLEN = 2
|
||||
};
|
||||
|
||||
#define SKEIN_MODIFIER_WORDS ( 2) /* number of modifier (tweak) words */
|
||||
|
||||
#define SKEIN_256_STATE_WORDS ( 4)
|
||||
#define SKEIN_512_STATE_WORDS ( 8)
|
||||
#define SKEIN1024_STATE_WORDS (16)
|
||||
#define SKEIN_MAX_STATE_WORDS (16)
|
||||
|
||||
#define SKEIN_256_STATE_BYTES ( 8*SKEIN_256_STATE_WORDS)
|
||||
#define SKEIN_512_STATE_BYTES ( 8*SKEIN_512_STATE_WORDS)
|
||||
#define SKEIN1024_STATE_BYTES ( 8*SKEIN1024_STATE_WORDS)
|
||||
|
||||
#define SKEIN_256_STATE_BITS (64*SKEIN_256_STATE_WORDS)
|
||||
#define SKEIN_512_STATE_BITS (64*SKEIN_512_STATE_WORDS)
|
||||
#define SKEIN1024_STATE_BITS (64*SKEIN1024_STATE_WORDS)
|
||||
|
||||
#define SKEIN_256_BLOCK_BYTES ( 8*SKEIN_256_STATE_WORDS)
|
||||
#define SKEIN_512_BLOCK_BYTES ( 8*SKEIN_512_STATE_WORDS)
|
||||
#define SKEIN1024_BLOCK_BYTES ( 8*SKEIN1024_STATE_WORDS)
|
||||
|
||||
typedef struct
|
||||
{
|
||||
size_t hashBitLen; /* size of hash result, in bits */
|
||||
size_t bCnt; /* current byte count in buffer b[] */
|
||||
u64b_t T[SKEIN_MODIFIER_WORDS]; /* tweak words: T[0]=byte cnt, T[1]=flags */
|
||||
} Skein_Ctxt_Hdr_t;
|
||||
|
||||
typedef struct /* 256-bit Skein hash context structure */
|
||||
{
|
||||
Skein_Ctxt_Hdr_t h; /* common header context variables */
|
||||
u64b_t X[SKEIN_256_STATE_WORDS]; /* chaining variables */
|
||||
u08b_t b[SKEIN_256_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
} Skein_256_Ctxt_t;
|
||||
|
||||
typedef struct /* 512-bit Skein hash context structure */
|
||||
{
|
||||
Skein_Ctxt_Hdr_t h; /* common header context variables */
|
||||
u64b_t X[SKEIN_512_STATE_WORDS]; /* chaining variables */
|
||||
u08b_t b[SKEIN_512_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
} Skein_512_Ctxt_t;
|
||||
|
||||
typedef struct /* 1024-bit Skein hash context structure */
|
||||
{
|
||||
Skein_Ctxt_Hdr_t h; /* common header context variables */
|
||||
u64b_t X[SKEIN1024_STATE_WORDS]; /* chaining variables */
|
||||
u08b_t b[SKEIN1024_BLOCK_BYTES]; /* partial block buffer (8-byte aligned) */
|
||||
} Skein1024_Ctxt_t;
|
||||
|
||||
/* Skein APIs for (incremental) "straight hashing" */
|
||||
int Skein_256_Init (Skein_256_Ctxt_t *ctx, size_t hashBitLen);
|
||||
int Skein_512_Init (Skein_512_Ctxt_t *ctx, size_t hashBitLen);
|
||||
int Skein1024_Init (Skein1024_Ctxt_t *ctx, size_t hashBitLen);
|
||||
|
||||
int Skein_256_Update(Skein_256_Ctxt_t *ctx, const u08b_t *msg, size_t msgByteCnt);
|
||||
int Skein_512_Update(Skein_512_Ctxt_t *ctx, const u08b_t *msg, size_t msgByteCnt);
|
||||
int Skein1024_Update(Skein1024_Ctxt_t *ctx, const u08b_t *msg, size_t msgByteCnt);
|
||||
|
||||
int Skein_256_Final (Skein_256_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
int Skein_512_Final (Skein_512_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
int Skein1024_Final (Skein1024_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
|
||||
/*
|
||||
** Skein APIs for "extended" initialization: MAC keys, tree hashing.
|
||||
** After an InitExt() call, just use Update/Final calls as with Init().
|
||||
**
|
||||
** Notes: Same parameters as _Init() calls, plus treeInfo/key/keyBytes.
|
||||
** When keyBytes == 0 and treeInfo == SKEIN_SEQUENTIAL,
|
||||
** the results of InitExt() are identical to calling Init().
|
||||
** The function Init() may be called once to "precompute" the IV for
|
||||
** a given hashBitLen value, then by saving a copy of the context
|
||||
** the IV computation may be avoided in later calls.
|
||||
** Similarly, the function InitExt() may be called once per MAC key
|
||||
** to precompute the MAC IV, then a copy of the context saved and
|
||||
** reused for each new MAC computation.
|
||||
**/
|
||||
int Skein_256_InitExt(Skein_256_Ctxt_t *ctx, size_t hashBitLen, u64b_t treeInfo, const u08b_t *key, size_t keyBytes);
|
||||
int Skein_512_InitExt(Skein_512_Ctxt_t *ctx, size_t hashBitLen, u64b_t treeInfo, const u08b_t *key, size_t keyBytes);
|
||||
int Skein1024_InitExt(Skein1024_Ctxt_t *ctx, size_t hashBitLen, u64b_t treeInfo, const u08b_t *key, size_t keyBytes);
|
||||
|
||||
/*
|
||||
** Skein APIs for MAC and tree hash:
|
||||
** Final_Pad: pad, do final block, but no OUTPUT type
|
||||
** Output: do just the output stage
|
||||
*/
|
||||
int Skein_256_Final_Pad(Skein_256_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
int Skein_512_Final_Pad(Skein_512_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
int Skein1024_Final_Pad(Skein1024_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
|
||||
#ifndef SKEIN_TREE_HASH
|
||||
#define SKEIN_TREE_HASH (1)
|
||||
#endif
|
||||
#if SKEIN_TREE_HASH
|
||||
int Skein_256_Output (Skein_256_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
int Skein_512_Output (Skein_512_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
int Skein1024_Output (Skein1024_Ctxt_t *ctx, u08b_t * hashVal);
|
||||
#endif
|
||||
|
||||
/*****************************************************************
|
||||
** "Internal" Skein definitions
|
||||
** -- not needed for sequential hashing API, but will be
|
||||
** helpful for other uses of Skein (e.g., tree hash mode).
|
||||
** -- included here so that they can be shared between
|
||||
** reference and optimized code.
|
||||
******************************************************************/
|
||||
|
||||
/* tweak word T[1]: bit field starting positions */
|
||||
#define SKEIN_T1_BIT(BIT) ((BIT) - 64) /* offset 64 because it's the second word */
|
||||
|
||||
#define SKEIN_T1_POS_TREE_LVL SKEIN_T1_BIT(112) /* bits 112..118: level in hash tree */
|
||||
#define SKEIN_T1_POS_BIT_PAD SKEIN_T1_BIT(119) /* bit 119 : partial final input byte */
|
||||
#define SKEIN_T1_POS_BLK_TYPE SKEIN_T1_BIT(120) /* bits 120..125: type field */
|
||||
#define SKEIN_T1_POS_FIRST SKEIN_T1_BIT(126) /* bits 126 : first block flag */
|
||||
#define SKEIN_T1_POS_FINAL SKEIN_T1_BIT(127) /* bit 127 : final block flag */
|
||||
|
||||
/* tweak word T[1]: flag bit definition(s) */
|
||||
#define SKEIN_T1_FLAG_FIRST (((u64b_t) 1 ) << SKEIN_T1_POS_FIRST)
|
||||
#define SKEIN_T1_FLAG_FINAL (((u64b_t) 1 ) << SKEIN_T1_POS_FINAL)
|
||||
#define SKEIN_T1_FLAG_BIT_PAD (((u64b_t) 1 ) << SKEIN_T1_POS_BIT_PAD)
|
||||
|
||||
/* tweak word T[1]: tree level bit field mask */
|
||||
#define SKEIN_T1_TREE_LVL_MASK (((u64b_t)0x7F) << SKEIN_T1_POS_TREE_LVL)
|
||||
#define SKEIN_T1_TREE_LEVEL(n) (((u64b_t) (n)) << SKEIN_T1_POS_TREE_LVL)
|
||||
|
||||
/* tweak word T[1]: block type field */
|
||||
#define SKEIN_BLK_TYPE_KEY ( 0) /* key, for MAC and KDF */
|
||||
#define SKEIN_BLK_TYPE_CFG ( 4) /* configuration block */
|
||||
#define SKEIN_BLK_TYPE_PERS ( 8) /* personalization string */
|
||||
#define SKEIN_BLK_TYPE_PK (12) /* public key (for digital signature hashing) */
|
||||
#define SKEIN_BLK_TYPE_KDF (16) /* key identifier for KDF */
|
||||
#define SKEIN_BLK_TYPE_NONCE (20) /* nonce for PRNG */
|
||||
#define SKEIN_BLK_TYPE_MSG (48) /* message processing */
|
||||
#define SKEIN_BLK_TYPE_OUT (63) /* output stage */
|
||||
#define SKEIN_BLK_TYPE_MASK (63) /* bit field mask */
|
||||
|
||||
#define SKEIN_T1_BLK_TYPE(T) (((u64b_t) (SKEIN_BLK_TYPE_##T)) << SKEIN_T1_POS_BLK_TYPE)
|
||||
#define SKEIN_T1_BLK_TYPE_KEY SKEIN_T1_BLK_TYPE(KEY) /* key, for MAC and KDF */
|
||||
#define SKEIN_T1_BLK_TYPE_CFG SKEIN_T1_BLK_TYPE(CFG) /* configuration block */
|
||||
#define SKEIN_T1_BLK_TYPE_PERS SKEIN_T1_BLK_TYPE(PERS) /* personalization string */
|
||||
#define SKEIN_T1_BLK_TYPE_PK SKEIN_T1_BLK_TYPE(PK) /* public key (for digital signature hashing) */
|
||||
#define SKEIN_T1_BLK_TYPE_KDF SKEIN_T1_BLK_TYPE(KDF) /* key identifier for KDF */
|
||||
#define SKEIN_T1_BLK_TYPE_NONCE SKEIN_T1_BLK_TYPE(NONCE)/* nonce for PRNG */
|
||||
#define SKEIN_T1_BLK_TYPE_MSG SKEIN_T1_BLK_TYPE(MSG) /* message processing */
|
||||
#define SKEIN_T1_BLK_TYPE_OUT SKEIN_T1_BLK_TYPE(OUT) /* output stage */
|
||||
#define SKEIN_T1_BLK_TYPE_MASK SKEIN_T1_BLK_TYPE(MASK) /* field bit mask */
|
||||
|
||||
#define SKEIN_T1_BLK_TYPE_CFG_FINAL (SKEIN_T1_BLK_TYPE_CFG | SKEIN_T1_FLAG_FINAL)
|
||||
#define SKEIN_T1_BLK_TYPE_OUT_FINAL (SKEIN_T1_BLK_TYPE_OUT | SKEIN_T1_FLAG_FINAL)
|
||||
|
||||
#define SKEIN_VERSION (1)
|
||||
|
||||
#ifndef SKEIN_ID_STRING_LE /* allow compile-time personalization */
|
||||
#define SKEIN_ID_STRING_LE (0x33414853) /* "SHA3" (little-endian)*/
|
||||
#endif
|
||||
|
||||
#define SKEIN_MK_64(hi32,lo32) ((lo32) + (((u64b_t) (hi32)) << 32))
|
||||
#define SKEIN_SCHEMA_VER SKEIN_MK_64(SKEIN_VERSION,SKEIN_ID_STRING_LE)
|
||||
#define SKEIN_KS_PARITY SKEIN_MK_64(0x1BD11BDA,0xA9FC1A22)
|
||||
|
||||
#define SKEIN_CFG_STR_LEN (4*8)
|
||||
|
||||
/* bit field definitions in config block treeInfo word */
|
||||
#define SKEIN_CFG_TREE_LEAF_SIZE_POS ( 0)
|
||||
#define SKEIN_CFG_TREE_NODE_SIZE_POS ( 8)
|
||||
#define SKEIN_CFG_TREE_MAX_LEVEL_POS (16)
|
||||
|
||||
#define SKEIN_CFG_TREE_LEAF_SIZE_MSK (((u64b_t) 0xFF) << SKEIN_CFG_TREE_LEAF_SIZE_POS)
|
||||
#define SKEIN_CFG_TREE_NODE_SIZE_MSK (((u64b_t) 0xFF) << SKEIN_CFG_TREE_NODE_SIZE_POS)
|
||||
#define SKEIN_CFG_TREE_MAX_LEVEL_MSK (((u64b_t) 0xFF) << SKEIN_CFG_TREE_MAX_LEVEL_POS)
|
||||
|
||||
#define SKEIN_CFG_TREE_INFO(leaf,node,maxLvl) \
|
||||
( (((u64b_t)(leaf )) << SKEIN_CFG_TREE_LEAF_SIZE_POS) | \
|
||||
(((u64b_t)(node )) << SKEIN_CFG_TREE_NODE_SIZE_POS) | \
|
||||
(((u64b_t)(maxLvl)) << SKEIN_CFG_TREE_MAX_LEVEL_POS) )
|
||||
|
||||
#define SKEIN_CFG_TREE_INFO_SEQUENTIAL SKEIN_CFG_TREE_INFO(0,0,0) /* use as treeInfo in InitExt() call for sequential processing */
|
||||
|
||||
/*
|
||||
** Skein macros for getting/setting tweak words, etc.
|
||||
** These are useful for partial input bytes, hash tree init/update, etc.
|
||||
**/
|
||||
#define Skein_Get_Tweak(ctxPtr,TWK_NUM) ((ctxPtr)->h.T[TWK_NUM])
|
||||
#define Skein_Set_Tweak(ctxPtr,TWK_NUM,tVal) {(ctxPtr)->h.T[TWK_NUM] = (tVal);}
|
||||
|
||||
#define Skein_Get_T0(ctxPtr) Skein_Get_Tweak(ctxPtr,0)
|
||||
#define Skein_Get_T1(ctxPtr) Skein_Get_Tweak(ctxPtr,1)
|
||||
#define Skein_Set_T0(ctxPtr,T0) Skein_Set_Tweak(ctxPtr,0,T0)
|
||||
#define Skein_Set_T1(ctxPtr,T1) Skein_Set_Tweak(ctxPtr,1,T1)
|
||||
|
||||
/* set both tweak words at once */
|
||||
#define Skein_Set_T0_T1(ctxPtr,T0,T1) \
|
||||
{ \
|
||||
Skein_Set_T0(ctxPtr,(T0)); \
|
||||
Skein_Set_T1(ctxPtr,(T1)); \
|
||||
}
|
||||
|
||||
#define Skein_Set_Type(ctxPtr,BLK_TYPE) \
|
||||
Skein_Set_T1(ctxPtr,SKEIN_T1_BLK_TYPE_##BLK_TYPE)
|
||||
|
||||
/* set up for starting with a new type: h.T[0]=0; h.T[1] = NEW_TYPE; h.bCnt=0; */
|
||||
#define Skein_Start_New_Type(ctxPtr,BLK_TYPE) \
|
||||
{ Skein_Set_T0_T1(ctxPtr,0,SKEIN_T1_FLAG_FIRST | SKEIN_T1_BLK_TYPE_##BLK_TYPE); (ctxPtr)->h.bCnt=0; }
|
||||
|
||||
#define Skein_Clear_First_Flag(hdr) { (hdr).T[1] &= ~SKEIN_T1_FLAG_FIRST; }
|
||||
#define Skein_Set_Bit_Pad_Flag(hdr) { (hdr).T[1] |= SKEIN_T1_FLAG_BIT_PAD; }
|
||||
|
||||
#define Skein_Set_Tree_Level(hdr,height) { (hdr).T[1] |= SKEIN_T1_TREE_LEVEL(height);}
|
||||
|
||||
/*****************************************************************
|
||||
** "Internal" Skein definitions for debugging and error checking
|
||||
******************************************************************/
|
||||
#ifdef SKEIN_DEBUG /* examine/display intermediate values? */
|
||||
#include "skein_debug.h"
|
||||
#else /* default is no callouts */
|
||||
#define Skein_Show_Block(bits,ctx,X,blkPtr,wPtr,ksEvenPtr,ksOddPtr)
|
||||
#define Skein_Show_Round(bits,ctx,r,X)
|
||||
#define Skein_Show_R_Ptr(bits,ctx,r,X_ptr)
|
||||
#define Skein_Show_Final(bits,ctx,cnt,outPtr)
|
||||
#define Skein_Show_Key(bits,ctx,key,keyBytes)
|
||||
#endif
|
||||
|
||||
#ifndef SKEIN_ERR_CHECK /* run-time checks (e.g., bad params, uninitialized context)? */
|
||||
#define Skein_Assert(x,retCode)/* default: ignore all Asserts, for performance */
|
||||
#define Skein_assert(x)
|
||||
#elif defined(SKEIN_ASSERT)
|
||||
#include <assert.h>
|
||||
#define Skein_Assert(x,retCode) assert(x)
|
||||
#define Skein_assert(x) assert(x)
|
||||
#else
|
||||
#include <assert.h>
|
||||
#define Skein_Assert(x,retCode) { if (!(x)) return retCode; } /* caller error */
|
||||
#define Skein_assert(x) assert(x) /* internal error */
|
||||
#endif
|
||||
|
||||
/*****************************************************************
|
||||
** Skein block function constants (shared across Ref and Opt code)
|
||||
******************************************************************/
|
||||
enum
|
||||
{
|
||||
/* Skein_256 round rotation constants */
|
||||
R_256_0_0=14, R_256_0_1=16,
|
||||
R_256_1_0=52, R_256_1_1=57,
|
||||
R_256_2_0=23, R_256_2_1=40,
|
||||
R_256_3_0= 5, R_256_3_1=37,
|
||||
R_256_4_0=25, R_256_4_1=33,
|
||||
R_256_5_0=46, R_256_5_1=12,
|
||||
R_256_6_0=58, R_256_6_1=22,
|
||||
R_256_7_0=32, R_256_7_1=32,
|
||||
|
||||
/* Skein_512 round rotation constants */
|
||||
R_512_0_0=46, R_512_0_1=36, R_512_0_2=19, R_512_0_3=37,
|
||||
R_512_1_0=33, R_512_1_1=27, R_512_1_2=14, R_512_1_3=42,
|
||||
R_512_2_0=17, R_512_2_1=49, R_512_2_2=36, R_512_2_3=39,
|
||||
R_512_3_0=44, R_512_3_1= 9, R_512_3_2=54, R_512_3_3=56,
|
||||
R_512_4_0=39, R_512_4_1=30, R_512_4_2=34, R_512_4_3=24,
|
||||
R_512_5_0=13, R_512_5_1=50, R_512_5_2=10, R_512_5_3=17,
|
||||
R_512_6_0=25, R_512_6_1=29, R_512_6_2=39, R_512_6_3=43,
|
||||
R_512_7_0= 8, R_512_7_1=35, R_512_7_2=56, R_512_7_3=22,
|
||||
|
||||
/* Skein1024 round rotation constants */
|
||||
R1024_0_0=24, R1024_0_1=13, R1024_0_2= 8, R1024_0_3=47, R1024_0_4= 8, R1024_0_5=17, R1024_0_6=22, R1024_0_7=37,
|
||||
R1024_1_0=38, R1024_1_1=19, R1024_1_2=10, R1024_1_3=55, R1024_1_4=49, R1024_1_5=18, R1024_1_6=23, R1024_1_7=52,
|
||||
R1024_2_0=33, R1024_2_1= 4, R1024_2_2=51, R1024_2_3=13, R1024_2_4=34, R1024_2_5=41, R1024_2_6=59, R1024_2_7=17,
|
||||
R1024_3_0= 5, R1024_3_1=20, R1024_3_2=48, R1024_3_3=41, R1024_3_4=47, R1024_3_5=28, R1024_3_6=16, R1024_3_7=25,
|
||||
R1024_4_0=41, R1024_4_1= 9, R1024_4_2=37, R1024_4_3=31, R1024_4_4=12, R1024_4_5=47, R1024_4_6=44, R1024_4_7=30,
|
||||
R1024_5_0=16, R1024_5_1=34, R1024_5_2=56, R1024_5_3=51, R1024_5_4= 4, R1024_5_5=53, R1024_5_6=42, R1024_5_7=41,
|
||||
R1024_6_0=31, R1024_6_1=44, R1024_6_2=47, R1024_6_3=46, R1024_6_4=19, R1024_6_5=42, R1024_6_6=44, R1024_6_7=25,
|
||||
R1024_7_0= 9, R1024_7_1=48, R1024_7_2=35, R1024_7_3=52, R1024_7_4=23, R1024_7_5=31, R1024_7_6=37, R1024_7_7=20
|
||||
};
|
||||
|
||||
#ifndef SKEIN_ROUNDS
|
||||
#define SKEIN_256_ROUNDS_TOTAL (72) /* number of rounds for the different block sizes */
|
||||
#define SKEIN_512_ROUNDS_TOTAL (72)
|
||||
#define SKEIN1024_ROUNDS_TOTAL (80)
|
||||
#else /* allow command-line define in range 8*(5..14) */
|
||||
#define SKEIN_256_ROUNDS_TOTAL (8*((((SKEIN_ROUNDS/100) + 5) % 10) + 5))
|
||||
#define SKEIN_512_ROUNDS_TOTAL (8*((((SKEIN_ROUNDS/ 10) + 5) % 10) + 5))
|
||||
#define SKEIN1024_ROUNDS_TOTAL (8*((((SKEIN_ROUNDS ) + 5) % 10) + 5))
|
||||
#endif
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Pull in FreeBSD specific shims */
|
||||
#include "skein_freebsd.h"
|
||||
|
||||
#endif /* ifndef _SKEIN_H_ */
|
706
sys/crypto/skein/skein_block.c
Normal file
706
sys/crypto/skein/skein_block.c
Normal file
@ -0,0 +1,706 @@
|
||||
/***********************************************************************
|
||||
**
|
||||
** Implementation of the Skein block functions.
|
||||
**
|
||||
** Source code author: Doug Whiting, 2008.
|
||||
**
|
||||
** This algorithm and source code is released to the public domain.
|
||||
**
|
||||
** Compile-time switches:
|
||||
**
|
||||
** SKEIN_USE_ASM -- set bits (256/512/1024) to select which
|
||||
** versions use ASM code for block processing
|
||||
** [default: use C for all block sizes]
|
||||
**
|
||||
************************************************************************/
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
__FBSDID("$FreeBSD$");
|
||||
|
||||
#include <sys/endian.h>
|
||||
#include <sys/types.h>
|
||||
|
||||
#ifdef _KERNEL
|
||||
#include <sys/systm.h>
|
||||
#else
|
||||
#include <string.h>
|
||||
#endif
|
||||
|
||||
#include "skein.h"
|
||||
|
||||
#ifndef SKEIN_USE_ASM
|
||||
#define SKEIN_USE_ASM (0) /* default is all C code (no ASM) */
|
||||
#endif
|
||||
|
||||
#ifndef SKEIN_LOOP
|
||||
#define SKEIN_LOOP 001 /* default: unroll 256 and 512, but not 1024 */
|
||||
#endif
|
||||
|
||||
#define BLK_BITS (WCNT*64) /* some useful definitions for code here */
|
||||
#define KW_TWK_BASE (0)
|
||||
#define KW_KEY_BASE (3)
|
||||
#define ks (kw + KW_KEY_BASE)
|
||||
#define ts (kw + KW_TWK_BASE)
|
||||
|
||||
#ifdef SKEIN_DEBUG
|
||||
#define DebugSaveTweak(ctx) { ctx->h.T[0] = ts[0]; ctx->h.T[1] = ts[1]; }
|
||||
#else
|
||||
#define DebugSaveTweak(ctx)
|
||||
#endif
|
||||
|
||||
/*****************************************************************/
|
||||
/* functions to process blkCnt (nonzero) full block(s) of data. */
|
||||
void Skein_256_Process_Block(Skein_256_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd);
|
||||
void Skein_512_Process_Block(Skein_512_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd);
|
||||
void Skein1024_Process_Block(Skein1024_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd);
|
||||
|
||||
/***************************** Skein_256 ******************************/
|
||||
#if !(SKEIN_USE_ASM & 256)
|
||||
void Skein_256_Process_Block(Skein_256_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd)
|
||||
{ /* do it in C */
|
||||
enum
|
||||
{
|
||||
WCNT = SKEIN_256_STATE_WORDS
|
||||
};
|
||||
#undef RCNT
|
||||
#define RCNT (SKEIN_256_ROUNDS_TOTAL/8)
|
||||
|
||||
#ifdef SKEIN_LOOP /* configure how much to unroll the loop */
|
||||
#define SKEIN_UNROLL_256 (((SKEIN_LOOP)/100)%10)
|
||||
#else
|
||||
#define SKEIN_UNROLL_256 (0)
|
||||
#endif
|
||||
|
||||
#if SKEIN_UNROLL_256
|
||||
#if (RCNT % SKEIN_UNROLL_256)
|
||||
#error "Invalid SKEIN_UNROLL_256" /* sanity check on unroll count */
|
||||
#endif
|
||||
size_t r;
|
||||
u64b_t kw[WCNT+4+RCNT*2]; /* key schedule words : chaining vars + tweak + "rotation"*/
|
||||
#else
|
||||
u64b_t kw[WCNT+4]; /* key schedule words : chaining vars + tweak */
|
||||
#endif
|
||||
u64b_t X0,X1,X2,X3; /* local copy of context vars, for speed */
|
||||
u64b_t w [WCNT]; /* local copy of input block */
|
||||
#ifdef SKEIN_DEBUG
|
||||
const u64b_t *Xptr[4]; /* use for debugging (help compiler put Xn in registers) */
|
||||
Xptr[0] = &X0; Xptr[1] = &X1; Xptr[2] = &X2; Xptr[3] = &X3;
|
||||
#endif
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
ts[0] = ctx->h.T[0];
|
||||
ts[1] = ctx->h.T[1];
|
||||
do {
|
||||
/* this implementation only supports 2**64 input bytes (no carry out here) */
|
||||
ts[0] += byteCntAdd; /* update processed length */
|
||||
|
||||
/* precompute the key schedule for this block */
|
||||
ks[0] = ctx->X[0];
|
||||
ks[1] = ctx->X[1];
|
||||
ks[2] = ctx->X[2];
|
||||
ks[3] = ctx->X[3];
|
||||
ks[4] = ks[0] ^ ks[1] ^ ks[2] ^ ks[3] ^ SKEIN_KS_PARITY;
|
||||
|
||||
ts[2] = ts[0] ^ ts[1];
|
||||
|
||||
Skein_Get64_LSB_First(w,blkPtr,WCNT); /* get input block in little-endian format */
|
||||
DebugSaveTweak(ctx);
|
||||
Skein_Show_Block(BLK_BITS,&ctx->h,ctx->X,blkPtr,w,ks,ts);
|
||||
|
||||
X0 = w[0] + ks[0]; /* do the first full key injection */
|
||||
X1 = w[1] + ks[1] + ts[0];
|
||||
X2 = w[2] + ks[2] + ts[1];
|
||||
X3 = w[3] + ks[3];
|
||||
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INITIAL,Xptr); /* show starting state values */
|
||||
|
||||
blkPtr += SKEIN_256_BLOCK_BYTES;
|
||||
|
||||
/* run the rounds */
|
||||
|
||||
#define Round256(p0,p1,p2,p3,ROT,rNum) \
|
||||
X##p0 += X##p1; X##p1 = RotL_64(X##p1,ROT##_0); X##p1 ^= X##p0; \
|
||||
X##p2 += X##p3; X##p3 = RotL_64(X##p3,ROT##_1); X##p3 ^= X##p2; \
|
||||
|
||||
#if SKEIN_UNROLL_256 == 0
|
||||
#define R256(p0,p1,p2,p3,ROT,rNum) /* fully unrolled */ \
|
||||
Round256(p0,p1,p2,p3,ROT,rNum) \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,rNum,Xptr);
|
||||
|
||||
#define I256(R) \
|
||||
X0 += ks[((R)+1) % 5]; /* inject the key schedule value */ \
|
||||
X1 += ks[((R)+2) % 5] + ts[((R)+1) % 3]; \
|
||||
X2 += ks[((R)+3) % 5] + ts[((R)+2) % 3]; \
|
||||
X3 += ks[((R)+4) % 5] + (R)+1; \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INJECT,Xptr);
|
||||
#else /* looping version */
|
||||
#define R256(p0,p1,p2,p3,ROT,rNum) \
|
||||
Round256(p0,p1,p2,p3,ROT,rNum) \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,4*(r-1)+rNum,Xptr);
|
||||
|
||||
#define I256(R) \
|
||||
X0 += ks[r+(R)+0]; /* inject the key schedule value */ \
|
||||
X1 += ks[r+(R)+1] + ts[r+(R)+0]; \
|
||||
X2 += ks[r+(R)+2] + ts[r+(R)+1]; \
|
||||
X3 += ks[r+(R)+3] + r+(R) ; \
|
||||
ks[r + (R)+4 ] = ks[r+(R)-1]; /* rotate key schedule */\
|
||||
ts[r + (R)+2 ] = ts[r+(R)-1]; \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INJECT,Xptr);
|
||||
|
||||
for (r=1;r < 2*RCNT;r+=2*SKEIN_UNROLL_256) /* loop thru it */
|
||||
#endif
|
||||
{
|
||||
#define R256_8_rounds(R) \
|
||||
R256(0,1,2,3,R_256_0,8*(R) + 1); \
|
||||
R256(0,3,2,1,R_256_1,8*(R) + 2); \
|
||||
R256(0,1,2,3,R_256_2,8*(R) + 3); \
|
||||
R256(0,3,2,1,R_256_3,8*(R) + 4); \
|
||||
I256(2*(R)); \
|
||||
R256(0,1,2,3,R_256_4,8*(R) + 5); \
|
||||
R256(0,3,2,1,R_256_5,8*(R) + 6); \
|
||||
R256(0,1,2,3,R_256_6,8*(R) + 7); \
|
||||
R256(0,3,2,1,R_256_7,8*(R) + 8); \
|
||||
I256(2*(R)+1);
|
||||
|
||||
R256_8_rounds( 0);
|
||||
|
||||
#define R256_Unroll_R(NN) ((SKEIN_UNROLL_256 == 0 && SKEIN_256_ROUNDS_TOTAL/8 > (NN)) || (SKEIN_UNROLL_256 > (NN)))
|
||||
|
||||
#if R256_Unroll_R( 1)
|
||||
R256_8_rounds( 1);
|
||||
#endif
|
||||
#if R256_Unroll_R( 2)
|
||||
R256_8_rounds( 2);
|
||||
#endif
|
||||
#if R256_Unroll_R( 3)
|
||||
R256_8_rounds( 3);
|
||||
#endif
|
||||
#if R256_Unroll_R( 4)
|
||||
R256_8_rounds( 4);
|
||||
#endif
|
||||
#if R256_Unroll_R( 5)
|
||||
R256_8_rounds( 5);
|
||||
#endif
|
||||
#if R256_Unroll_R( 6)
|
||||
R256_8_rounds( 6);
|
||||
#endif
|
||||
#if R256_Unroll_R( 7)
|
||||
R256_8_rounds( 7);
|
||||
#endif
|
||||
#if R256_Unroll_R( 8)
|
||||
R256_8_rounds( 8);
|
||||
#endif
|
||||
#if R256_Unroll_R( 9)
|
||||
R256_8_rounds( 9);
|
||||
#endif
|
||||
#if R256_Unroll_R(10)
|
||||
R256_8_rounds(10);
|
||||
#endif
|
||||
#if R256_Unroll_R(11)
|
||||
R256_8_rounds(11);
|
||||
#endif
|
||||
#if R256_Unroll_R(12)
|
||||
R256_8_rounds(12);
|
||||
#endif
|
||||
#if R256_Unroll_R(13)
|
||||
R256_8_rounds(13);
|
||||
#endif
|
||||
#if R256_Unroll_R(14)
|
||||
R256_8_rounds(14);
|
||||
#endif
|
||||
#if (SKEIN_UNROLL_256 > 14)
|
||||
#error "need more unrolling in Skein_256_Process_Block"
|
||||
#endif
|
||||
}
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = X0 ^ w[0];
|
||||
ctx->X[1] = X1 ^ w[1];
|
||||
ctx->X[2] = X2 ^ w[2];
|
||||
ctx->X[3] = X3 ^ w[3];
|
||||
|
||||
Skein_Show_Round(BLK_BITS,&ctx->h,SKEIN_RND_FEED_FWD,ctx->X);
|
||||
|
||||
ts[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
}
|
||||
while (--blkCnt);
|
||||
ctx->h.T[0] = ts[0];
|
||||
ctx->h.T[1] = ts[1];
|
||||
}
|
||||
|
||||
#if defined(SKEIN_CODE_SIZE) || defined(SKEIN_PERF)
|
||||
size_t Skein_256_Process_Block_CodeSize(void)
|
||||
{
|
||||
return ((u08b_t *) Skein_256_Process_Block_CodeSize) -
|
||||
((u08b_t *) Skein_256_Process_Block);
|
||||
}
|
||||
uint_t Skein_256_Unroll_Cnt(void)
|
||||
{
|
||||
return SKEIN_UNROLL_256;
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/***************************** Skein_512 ******************************/
|
||||
#if !(SKEIN_USE_ASM & 512)
|
||||
void Skein_512_Process_Block(Skein_512_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd)
|
||||
{ /* do it in C */
|
||||
enum
|
||||
{
|
||||
WCNT = SKEIN_512_STATE_WORDS
|
||||
};
|
||||
#undef RCNT
|
||||
#define RCNT (SKEIN_512_ROUNDS_TOTAL/8)
|
||||
|
||||
#ifdef SKEIN_LOOP /* configure how much to unroll the loop */
|
||||
#define SKEIN_UNROLL_512 (((SKEIN_LOOP)/10)%10)
|
||||
#else
|
||||
#define SKEIN_UNROLL_512 (0)
|
||||
#endif
|
||||
|
||||
#if SKEIN_UNROLL_512
|
||||
#if (RCNT % SKEIN_UNROLL_512)
|
||||
#error "Invalid SKEIN_UNROLL_512" /* sanity check on unroll count */
|
||||
#endif
|
||||
size_t r;
|
||||
u64b_t kw[WCNT+4+RCNT*2]; /* key schedule words : chaining vars + tweak + "rotation"*/
|
||||
#else
|
||||
u64b_t kw[WCNT+4]; /* key schedule words : chaining vars + tweak */
|
||||
#endif
|
||||
u64b_t X0,X1,X2,X3,X4,X5,X6,X7; /* local copy of vars, for speed */
|
||||
u64b_t w [WCNT]; /* local copy of input block */
|
||||
#ifdef SKEIN_DEBUG
|
||||
const u64b_t *Xptr[8]; /* use for debugging (help compiler put Xn in registers) */
|
||||
Xptr[0] = &X0; Xptr[1] = &X1; Xptr[2] = &X2; Xptr[3] = &X3;
|
||||
Xptr[4] = &X4; Xptr[5] = &X5; Xptr[6] = &X6; Xptr[7] = &X7;
|
||||
#endif
|
||||
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
ts[0] = ctx->h.T[0];
|
||||
ts[1] = ctx->h.T[1];
|
||||
do {
|
||||
/* this implementation only supports 2**64 input bytes (no carry out here) */
|
||||
ts[0] += byteCntAdd; /* update processed length */
|
||||
|
||||
/* precompute the key schedule for this block */
|
||||
ks[0] = ctx->X[0];
|
||||
ks[1] = ctx->X[1];
|
||||
ks[2] = ctx->X[2];
|
||||
ks[3] = ctx->X[3];
|
||||
ks[4] = ctx->X[4];
|
||||
ks[5] = ctx->X[5];
|
||||
ks[6] = ctx->X[6];
|
||||
ks[7] = ctx->X[7];
|
||||
ks[8] = ks[0] ^ ks[1] ^ ks[2] ^ ks[3] ^
|
||||
ks[4] ^ ks[5] ^ ks[6] ^ ks[7] ^ SKEIN_KS_PARITY;
|
||||
|
||||
ts[2] = ts[0] ^ ts[1];
|
||||
|
||||
Skein_Get64_LSB_First(w,blkPtr,WCNT); /* get input block in little-endian format */
|
||||
DebugSaveTweak(ctx);
|
||||
Skein_Show_Block(BLK_BITS,&ctx->h,ctx->X,blkPtr,w,ks,ts);
|
||||
|
||||
X0 = w[0] + ks[0]; /* do the first full key injection */
|
||||
X1 = w[1] + ks[1];
|
||||
X2 = w[2] + ks[2];
|
||||
X3 = w[3] + ks[3];
|
||||
X4 = w[4] + ks[4];
|
||||
X5 = w[5] + ks[5] + ts[0];
|
||||
X6 = w[6] + ks[6] + ts[1];
|
||||
X7 = w[7] + ks[7];
|
||||
|
||||
blkPtr += SKEIN_512_BLOCK_BYTES;
|
||||
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INITIAL,Xptr);
|
||||
/* run the rounds */
|
||||
#define Round512(p0,p1,p2,p3,p4,p5,p6,p7,ROT,rNum) \
|
||||
X##p0 += X##p1; X##p1 = RotL_64(X##p1,ROT##_0); X##p1 ^= X##p0; \
|
||||
X##p2 += X##p3; X##p3 = RotL_64(X##p3,ROT##_1); X##p3 ^= X##p2; \
|
||||
X##p4 += X##p5; X##p5 = RotL_64(X##p5,ROT##_2); X##p5 ^= X##p4; \
|
||||
X##p6 += X##p7; X##p7 = RotL_64(X##p7,ROT##_3); X##p7 ^= X##p6; \
|
||||
|
||||
#if SKEIN_UNROLL_512 == 0
|
||||
#define R512(p0,p1,p2,p3,p4,p5,p6,p7,ROT,rNum) /* unrolled */ \
|
||||
Round512(p0,p1,p2,p3,p4,p5,p6,p7,ROT,rNum) \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,rNum,Xptr);
|
||||
|
||||
#define I512(R) \
|
||||
X0 += ks[((R)+1) % 9]; /* inject the key schedule value */ \
|
||||
X1 += ks[((R)+2) % 9]; \
|
||||
X2 += ks[((R)+3) % 9]; \
|
||||
X3 += ks[((R)+4) % 9]; \
|
||||
X4 += ks[((R)+5) % 9]; \
|
||||
X5 += ks[((R)+6) % 9] + ts[((R)+1) % 3]; \
|
||||
X6 += ks[((R)+7) % 9] + ts[((R)+2) % 3]; \
|
||||
X7 += ks[((R)+8) % 9] + (R)+1; \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INJECT,Xptr);
|
||||
#else /* looping version */
|
||||
#define R512(p0,p1,p2,p3,p4,p5,p6,p7,ROT,rNum) \
|
||||
Round512(p0,p1,p2,p3,p4,p5,p6,p7,ROT,rNum) \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,4*(r-1)+rNum,Xptr);
|
||||
|
||||
#define I512(R) \
|
||||
X0 += ks[r+(R)+0]; /* inject the key schedule value */ \
|
||||
X1 += ks[r+(R)+1]; \
|
||||
X2 += ks[r+(R)+2]; \
|
||||
X3 += ks[r+(R)+3]; \
|
||||
X4 += ks[r+(R)+4]; \
|
||||
X5 += ks[r+(R)+5] + ts[r+(R)+0]; \
|
||||
X6 += ks[r+(R)+6] + ts[r+(R)+1]; \
|
||||
X7 += ks[r+(R)+7] + r+(R) ; \
|
||||
ks[r + (R)+8] = ks[r+(R)-1]; /* rotate key schedule */ \
|
||||
ts[r + (R)+2] = ts[r+(R)-1]; \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INJECT,Xptr);
|
||||
|
||||
for (r=1;r < 2*RCNT;r+=2*SKEIN_UNROLL_512) /* loop thru it */
|
||||
#endif /* end of looped code definitions */
|
||||
{
|
||||
#define R512_8_rounds(R) /* do 8 full rounds */ \
|
||||
R512(0,1,2,3,4,5,6,7,R_512_0,8*(R)+ 1); \
|
||||
R512(2,1,4,7,6,5,0,3,R_512_1,8*(R)+ 2); \
|
||||
R512(4,1,6,3,0,5,2,7,R_512_2,8*(R)+ 3); \
|
||||
R512(6,1,0,7,2,5,4,3,R_512_3,8*(R)+ 4); \
|
||||
I512(2*(R)); \
|
||||
R512(0,1,2,3,4,5,6,7,R_512_4,8*(R)+ 5); \
|
||||
R512(2,1,4,7,6,5,0,3,R_512_5,8*(R)+ 6); \
|
||||
R512(4,1,6,3,0,5,2,7,R_512_6,8*(R)+ 7); \
|
||||
R512(6,1,0,7,2,5,4,3,R_512_7,8*(R)+ 8); \
|
||||
I512(2*(R)+1); /* and key injection */
|
||||
|
||||
R512_8_rounds( 0);
|
||||
|
||||
#define R512_Unroll_R(NN) ((SKEIN_UNROLL_512 == 0 && SKEIN_512_ROUNDS_TOTAL/8 > (NN)) || (SKEIN_UNROLL_512 > (NN)))
|
||||
|
||||
#if R512_Unroll_R( 1)
|
||||
R512_8_rounds( 1);
|
||||
#endif
|
||||
#if R512_Unroll_R( 2)
|
||||
R512_8_rounds( 2);
|
||||
#endif
|
||||
#if R512_Unroll_R( 3)
|
||||
R512_8_rounds( 3);
|
||||
#endif
|
||||
#if R512_Unroll_R( 4)
|
||||
R512_8_rounds( 4);
|
||||
#endif
|
||||
#if R512_Unroll_R( 5)
|
||||
R512_8_rounds( 5);
|
||||
#endif
|
||||
#if R512_Unroll_R( 6)
|
||||
R512_8_rounds( 6);
|
||||
#endif
|
||||
#if R512_Unroll_R( 7)
|
||||
R512_8_rounds( 7);
|
||||
#endif
|
||||
#if R512_Unroll_R( 8)
|
||||
R512_8_rounds( 8);
|
||||
#endif
|
||||
#if R512_Unroll_R( 9)
|
||||
R512_8_rounds( 9);
|
||||
#endif
|
||||
#if R512_Unroll_R(10)
|
||||
R512_8_rounds(10);
|
||||
#endif
|
||||
#if R512_Unroll_R(11)
|
||||
R512_8_rounds(11);
|
||||
#endif
|
||||
#if R512_Unroll_R(12)
|
||||
R512_8_rounds(12);
|
||||
#endif
|
||||
#if R512_Unroll_R(13)
|
||||
R512_8_rounds(13);
|
||||
#endif
|
||||
#if R512_Unroll_R(14)
|
||||
R512_8_rounds(14);
|
||||
#endif
|
||||
#if (SKEIN_UNROLL_512 > 14)
|
||||
#error "need more unrolling in Skein_512_Process_Block"
|
||||
#endif
|
||||
}
|
||||
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
ctx->X[0] = X0 ^ w[0];
|
||||
ctx->X[1] = X1 ^ w[1];
|
||||
ctx->X[2] = X2 ^ w[2];
|
||||
ctx->X[3] = X3 ^ w[3];
|
||||
ctx->X[4] = X4 ^ w[4];
|
||||
ctx->X[5] = X5 ^ w[5];
|
||||
ctx->X[6] = X6 ^ w[6];
|
||||
ctx->X[7] = X7 ^ w[7];
|
||||
Skein_Show_Round(BLK_BITS,&ctx->h,SKEIN_RND_FEED_FWD,ctx->X);
|
||||
|
||||
ts[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
}
|
||||
while (--blkCnt);
|
||||
ctx->h.T[0] = ts[0];
|
||||
ctx->h.T[1] = ts[1];
|
||||
}
|
||||
|
||||
#if defined(SKEIN_CODE_SIZE) || defined(SKEIN_PERF)
|
||||
size_t Skein_512_Process_Block_CodeSize(void)
|
||||
{
|
||||
return ((u08b_t *) Skein_512_Process_Block_CodeSize) -
|
||||
((u08b_t *) Skein_512_Process_Block);
|
||||
}
|
||||
uint_t Skein_512_Unroll_Cnt(void)
|
||||
{
|
||||
return SKEIN_UNROLL_512;
|
||||
}
|
||||
#endif
|
||||
#endif
|
||||
|
||||
/***************************** Skein1024 ******************************/
|
||||
#if !(SKEIN_USE_ASM & 1024)
|
||||
void Skein1024_Process_Block(Skein1024_Ctxt_t *ctx,const u08b_t *blkPtr,size_t blkCnt,size_t byteCntAdd)
|
||||
{ /* do it in C, always looping (unrolled is bigger AND slower!) */
|
||||
enum
|
||||
{
|
||||
WCNT = SKEIN1024_STATE_WORDS
|
||||
};
|
||||
#undef RCNT
|
||||
#define RCNT (SKEIN1024_ROUNDS_TOTAL/8)
|
||||
|
||||
#ifdef SKEIN_LOOP /* configure how much to unroll the loop */
|
||||
#define SKEIN_UNROLL_1024 ((SKEIN_LOOP)%10)
|
||||
#else
|
||||
#define SKEIN_UNROLL_1024 (0)
|
||||
#endif
|
||||
|
||||
#if (SKEIN_UNROLL_1024 != 0)
|
||||
#if (RCNT % SKEIN_UNROLL_1024)
|
||||
#error "Invalid SKEIN_UNROLL_1024" /* sanity check on unroll count */
|
||||
#endif
|
||||
size_t r;
|
||||
u64b_t kw[WCNT+4+RCNT*2]; /* key schedule words : chaining vars + tweak + "rotation"*/
|
||||
#else
|
||||
u64b_t kw[WCNT+4]; /* key schedule words : chaining vars + tweak */
|
||||
#endif
|
||||
|
||||
u64b_t X00,X01,X02,X03,X04,X05,X06,X07, /* local copy of vars, for speed */
|
||||
X08,X09,X10,X11,X12,X13,X14,X15;
|
||||
u64b_t w [WCNT]; /* local copy of input block */
|
||||
#ifdef SKEIN_DEBUG
|
||||
const u64b_t *Xptr[16]; /* use for debugging (help compiler put Xn in registers) */
|
||||
Xptr[ 0] = &X00; Xptr[ 1] = &X01; Xptr[ 2] = &X02; Xptr[ 3] = &X03;
|
||||
Xptr[ 4] = &X04; Xptr[ 5] = &X05; Xptr[ 6] = &X06; Xptr[ 7] = &X07;
|
||||
Xptr[ 8] = &X08; Xptr[ 9] = &X09; Xptr[10] = &X10; Xptr[11] = &X11;
|
||||
Xptr[12] = &X12; Xptr[13] = &X13; Xptr[14] = &X14; Xptr[15] = &X15;
|
||||
#endif
|
||||
|
||||
Skein_assert(blkCnt != 0); /* never call with blkCnt == 0! */
|
||||
ts[0] = ctx->h.T[0];
|
||||
ts[1] = ctx->h.T[1];
|
||||
do {
|
||||
/* this implementation only supports 2**64 input bytes (no carry out here) */
|
||||
ts[0] += byteCntAdd; /* update processed length */
|
||||
|
||||
/* precompute the key schedule for this block */
|
||||
ks[ 0] = ctx->X[ 0];
|
||||
ks[ 1] = ctx->X[ 1];
|
||||
ks[ 2] = ctx->X[ 2];
|
||||
ks[ 3] = ctx->X[ 3];
|
||||
ks[ 4] = ctx->X[ 4];
|
||||
ks[ 5] = ctx->X[ 5];
|
||||
ks[ 6] = ctx->X[ 6];
|
||||
ks[ 7] = ctx->X[ 7];
|
||||
ks[ 8] = ctx->X[ 8];
|
||||
ks[ 9] = ctx->X[ 9];
|
||||
ks[10] = ctx->X[10];
|
||||
ks[11] = ctx->X[11];
|
||||
ks[12] = ctx->X[12];
|
||||
ks[13] = ctx->X[13];
|
||||
ks[14] = ctx->X[14];
|
||||
ks[15] = ctx->X[15];
|
||||
ks[16] = ks[ 0] ^ ks[ 1] ^ ks[ 2] ^ ks[ 3] ^
|
||||
ks[ 4] ^ ks[ 5] ^ ks[ 6] ^ ks[ 7] ^
|
||||
ks[ 8] ^ ks[ 9] ^ ks[10] ^ ks[11] ^
|
||||
ks[12] ^ ks[13] ^ ks[14] ^ ks[15] ^ SKEIN_KS_PARITY;
|
||||
|
||||
ts[2] = ts[0] ^ ts[1];
|
||||
|
||||
Skein_Get64_LSB_First(w,blkPtr,WCNT); /* get input block in little-endian format */
|
||||
DebugSaveTweak(ctx);
|
||||
Skein_Show_Block(BLK_BITS,&ctx->h,ctx->X,blkPtr,w,ks,ts);
|
||||
|
||||
X00 = w[ 0] + ks[ 0]; /* do the first full key injection */
|
||||
X01 = w[ 1] + ks[ 1];
|
||||
X02 = w[ 2] + ks[ 2];
|
||||
X03 = w[ 3] + ks[ 3];
|
||||
X04 = w[ 4] + ks[ 4];
|
||||
X05 = w[ 5] + ks[ 5];
|
||||
X06 = w[ 6] + ks[ 6];
|
||||
X07 = w[ 7] + ks[ 7];
|
||||
X08 = w[ 8] + ks[ 8];
|
||||
X09 = w[ 9] + ks[ 9];
|
||||
X10 = w[10] + ks[10];
|
||||
X11 = w[11] + ks[11];
|
||||
X12 = w[12] + ks[12];
|
||||
X13 = w[13] + ks[13] + ts[0];
|
||||
X14 = w[14] + ks[14] + ts[1];
|
||||
X15 = w[15] + ks[15];
|
||||
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INITIAL,Xptr);
|
||||
|
||||
#define Round1024(p0,p1,p2,p3,p4,p5,p6,p7,p8,p9,pA,pB,pC,pD,pE,pF,ROT,rNum) \
|
||||
X##p0 += X##p1; X##p1 = RotL_64(X##p1,ROT##_0); X##p1 ^= X##p0; \
|
||||
X##p2 += X##p3; X##p3 = RotL_64(X##p3,ROT##_1); X##p3 ^= X##p2; \
|
||||
X##p4 += X##p5; X##p5 = RotL_64(X##p5,ROT##_2); X##p5 ^= X##p4; \
|
||||
X##p6 += X##p7; X##p7 = RotL_64(X##p7,ROT##_3); X##p7 ^= X##p6; \
|
||||
X##p8 += X##p9; X##p9 = RotL_64(X##p9,ROT##_4); X##p9 ^= X##p8; \
|
||||
X##pA += X##pB; X##pB = RotL_64(X##pB,ROT##_5); X##pB ^= X##pA; \
|
||||
X##pC += X##pD; X##pD = RotL_64(X##pD,ROT##_6); X##pD ^= X##pC; \
|
||||
X##pE += X##pF; X##pF = RotL_64(X##pF,ROT##_7); X##pF ^= X##pE; \
|
||||
|
||||
#if SKEIN_UNROLL_1024 == 0
|
||||
#define R1024(p0,p1,p2,p3,p4,p5,p6,p7,p8,p9,pA,pB,pC,pD,pE,pF,ROT,rn) \
|
||||
Round1024(p0,p1,p2,p3,p4,p5,p6,p7,p8,p9,pA,pB,pC,pD,pE,pF,ROT,rn) \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,rn,Xptr);
|
||||
|
||||
#define I1024(R) \
|
||||
X00 += ks[((R)+ 1) % 17]; /* inject the key schedule value */ \
|
||||
X01 += ks[((R)+ 2) % 17]; \
|
||||
X02 += ks[((R)+ 3) % 17]; \
|
||||
X03 += ks[((R)+ 4) % 17]; \
|
||||
X04 += ks[((R)+ 5) % 17]; \
|
||||
X05 += ks[((R)+ 6) % 17]; \
|
||||
X06 += ks[((R)+ 7) % 17]; \
|
||||
X07 += ks[((R)+ 8) % 17]; \
|
||||
X08 += ks[((R)+ 9) % 17]; \
|
||||
X09 += ks[((R)+10) % 17]; \
|
||||
X10 += ks[((R)+11) % 17]; \
|
||||
X11 += ks[((R)+12) % 17]; \
|
||||
X12 += ks[((R)+13) % 17]; \
|
||||
X13 += ks[((R)+14) % 17] + ts[((R)+1) % 3]; \
|
||||
X14 += ks[((R)+15) % 17] + ts[((R)+2) % 3]; \
|
||||
X15 += ks[((R)+16) % 17] + (R)+1; \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INJECT,Xptr);
|
||||
#else /* looping version */
|
||||
#define R1024(p0,p1,p2,p3,p4,p5,p6,p7,p8,p9,pA,pB,pC,pD,pE,pF,ROT,rn) \
|
||||
Round1024(p0,p1,p2,p3,p4,p5,p6,p7,p8,p9,pA,pB,pC,pD,pE,pF,ROT,rn) \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,4*(r-1)+rn,Xptr);
|
||||
|
||||
#define I1024(R) \
|
||||
X00 += ks[r+(R)+ 0]; /* inject the key schedule value */ \
|
||||
X01 += ks[r+(R)+ 1]; \
|
||||
X02 += ks[r+(R)+ 2]; \
|
||||
X03 += ks[r+(R)+ 3]; \
|
||||
X04 += ks[r+(R)+ 4]; \
|
||||
X05 += ks[r+(R)+ 5]; \
|
||||
X06 += ks[r+(R)+ 6]; \
|
||||
X07 += ks[r+(R)+ 7]; \
|
||||
X08 += ks[r+(R)+ 8]; \
|
||||
X09 += ks[r+(R)+ 9]; \
|
||||
X10 += ks[r+(R)+10]; \
|
||||
X11 += ks[r+(R)+11]; \
|
||||
X12 += ks[r+(R)+12]; \
|
||||
X13 += ks[r+(R)+13] + ts[r+(R)+0]; \
|
||||
X14 += ks[r+(R)+14] + ts[r+(R)+1]; \
|
||||
X15 += ks[r+(R)+15] + r+(R) ; \
|
||||
ks[r + (R)+16] = ks[r+(R)-1]; /* rotate key schedule */ \
|
||||
ts[r + (R)+ 2] = ts[r+(R)-1]; \
|
||||
Skein_Show_R_Ptr(BLK_BITS,&ctx->h,SKEIN_RND_KEY_INJECT,Xptr);
|
||||
|
||||
for (r=1;r <= 2*RCNT;r+=2*SKEIN_UNROLL_1024) /* loop thru it */
|
||||
#endif
|
||||
{
|
||||
#define R1024_8_rounds(R) /* do 8 full rounds */ \
|
||||
R1024(00,01,02,03,04,05,06,07,08,09,10,11,12,13,14,15,R1024_0,8*(R) + 1); \
|
||||
R1024(00,09,02,13,06,11,04,15,10,07,12,03,14,05,08,01,R1024_1,8*(R) + 2); \
|
||||
R1024(00,07,02,05,04,03,06,01,12,15,14,13,08,11,10,09,R1024_2,8*(R) + 3); \
|
||||
R1024(00,15,02,11,06,13,04,09,14,01,08,05,10,03,12,07,R1024_3,8*(R) + 4); \
|
||||
I1024(2*(R)); \
|
||||
R1024(00,01,02,03,04,05,06,07,08,09,10,11,12,13,14,15,R1024_4,8*(R) + 5); \
|
||||
R1024(00,09,02,13,06,11,04,15,10,07,12,03,14,05,08,01,R1024_5,8*(R) + 6); \
|
||||
R1024(00,07,02,05,04,03,06,01,12,15,14,13,08,11,10,09,R1024_6,8*(R) + 7); \
|
||||
R1024(00,15,02,11,06,13,04,09,14,01,08,05,10,03,12,07,R1024_7,8*(R) + 8); \
|
||||
I1024(2*(R)+1);
|
||||
|
||||
R1024_8_rounds( 0);
|
||||
|
||||
#define R1024_Unroll_R(NN) ((SKEIN_UNROLL_1024 == 0 && SKEIN1024_ROUNDS_TOTAL/8 > (NN)) || (SKEIN_UNROLL_1024 > (NN)))
|
||||
|
||||
#if R1024_Unroll_R( 1)
|
||||
R1024_8_rounds( 1);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 2)
|
||||
R1024_8_rounds( 2);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 3)
|
||||
R1024_8_rounds( 3);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 4)
|
||||
R1024_8_rounds( 4);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 5)
|
||||
R1024_8_rounds( 5);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 6)
|
||||
R1024_8_rounds( 6);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 7)
|
||||
R1024_8_rounds( 7);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 8)
|
||||
R1024_8_rounds( 8);
|
||||
#endif
|
||||
#if R1024_Unroll_R( 9)
|
||||
R1024_8_rounds( 9);
|
||||
#endif
|
||||
#if R1024_Unroll_R(10)
|
||||
R1024_8_rounds(10);
|
||||
#endif
|
||||
#if R1024_Unroll_R(11)
|
||||
R1024_8_rounds(11);
|
||||
#endif
|
||||
#if R1024_Unroll_R(12)
|
||||
R1024_8_rounds(12);
|
||||
#endif
|
||||
#if R1024_Unroll_R(13)
|
||||
R1024_8_rounds(13);
|
||||
#endif
|
||||
#if R1024_Unroll_R(14)
|
||||
R1024_8_rounds(14);
|
||||
#endif
|
||||
#if (SKEIN_UNROLL_1024 > 14)
|
||||
#error "need more unrolling in Skein_1024_Process_Block"
|
||||
#endif
|
||||
}
|
||||
/* do the final "feedforward" xor, update context chaining vars */
|
||||
|
||||
ctx->X[ 0] = X00 ^ w[ 0];
|
||||
ctx->X[ 1] = X01 ^ w[ 1];
|
||||
ctx->X[ 2] = X02 ^ w[ 2];
|
||||
ctx->X[ 3] = X03 ^ w[ 3];
|
||||
ctx->X[ 4] = X04 ^ w[ 4];
|
||||
ctx->X[ 5] = X05 ^ w[ 5];
|
||||
ctx->X[ 6] = X06 ^ w[ 6];
|
||||
ctx->X[ 7] = X07 ^ w[ 7];
|
||||
ctx->X[ 8] = X08 ^ w[ 8];
|
||||
ctx->X[ 9] = X09 ^ w[ 9];
|
||||
ctx->X[10] = X10 ^ w[10];
|
||||
ctx->X[11] = X11 ^ w[11];
|
||||
ctx->X[12] = X12 ^ w[12];
|
||||
ctx->X[13] = X13 ^ w[13];
|
||||
ctx->X[14] = X14 ^ w[14];
|
||||
ctx->X[15] = X15 ^ w[15];
|
||||
|
||||
Skein_Show_Round(BLK_BITS,&ctx->h,SKEIN_RND_FEED_FWD,ctx->X);
|
||||
|
||||
ts[1] &= ~SKEIN_T1_FLAG_FIRST;
|
||||
blkPtr += SKEIN1024_BLOCK_BYTES;
|
||||
}
|
||||
while (--blkCnt);
|
||||
ctx->h.T[0] = ts[0];
|
||||
ctx->h.T[1] = ts[1];
|
||||
}
|
||||
|
||||
#if defined(SKEIN_CODE_SIZE) || defined(SKEIN_PERF)
|
||||
size_t Skein1024_Process_Block_CodeSize(void)
|
||||
{
|
||||
return ((u08b_t *) Skein1024_Process_Block_CodeSize) -
|
||||
((u08b_t *) Skein1024_Process_Block);
|
||||
}
|
||||
uint_t Skein1024_Unroll_Cnt(void)
|
||||
{
|
||||
return SKEIN_UNROLL_1024;
|
||||
}
|
||||
#endif
|
||||
#endif
|
247
sys/crypto/skein/skein_debug.c
Normal file
247
sys/crypto/skein/skein_debug.c
Normal file
@ -0,0 +1,247 @@
|
||||
/***********************************************************************
|
||||
**
|
||||
** Debug output functions for Skein hashing.
|
||||
**
|
||||
** Source code author: Doug Whiting, 2008.
|
||||
**
|
||||
** This algorithm and source code is released to the public domain.
|
||||
**
|
||||
************************************************************************/
|
||||
#include <stdio.h>
|
||||
|
||||
#ifdef SKEIN_DEBUG /* only instantiate this code if SKEIN_DEBUG is on */
|
||||
#include "skein.h"
|
||||
|
||||
static const char INDENT[] = " "; /* how much to indent on new line */
|
||||
|
||||
uint_t skein_DebugFlag = 0; /* off by default. Must be set externally */
|
||||
|
||||
static void Show64_step(size_t cnt,const u64b_t *X,size_t step)
|
||||
{
|
||||
size_t i,j;
|
||||
for (i=j=0;i < cnt;i++,j+=step)
|
||||
{
|
||||
if (i % 4 == 0) printf(INDENT);
|
||||
printf(" %08X.%08X ",(uint_32t)(X[j] >> 32),(uint_32t)X[j]);
|
||||
if (i % 4 == 3 || i==cnt-1) printf("\n");
|
||||
fflush(stdout);
|
||||
}
|
||||
}
|
||||
|
||||
#define Show64(cnt,X) Show64_step(cnt,X,1)
|
||||
|
||||
static void Show64_flag(size_t cnt,const u64b_t *X)
|
||||
{
|
||||
size_t xptr = (size_t) X;
|
||||
size_t step = (xptr & 1) ? 2 : 1;
|
||||
if (step != 1)
|
||||
{
|
||||
X = (const u64b_t *) (xptr & ~1);
|
||||
}
|
||||
Show64_step(cnt,X,step);
|
||||
}
|
||||
|
||||
static void Show08(size_t cnt,const u08b_t *b)
|
||||
{
|
||||
size_t i;
|
||||
for (i=0;i < cnt;i++)
|
||||
{
|
||||
if (i %16 == 0) printf(INDENT);
|
||||
else if (i % 4 == 0) printf(" ");
|
||||
printf(" %02X",b[i]);
|
||||
if (i %16 == 15 || i==cnt-1) printf("\n");
|
||||
fflush(stdout);
|
||||
}
|
||||
}
|
||||
|
||||
static const char *AlgoHeader(uint_t bits)
|
||||
{
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_THREEFISH)
|
||||
switch (bits)
|
||||
{
|
||||
case 256: return ":Threefish-256: ";
|
||||
case 512: return ":Threefish-512: ";
|
||||
case 1024: return ":Threefish-1024:";
|
||||
}
|
||||
else
|
||||
switch (bits)
|
||||
{
|
||||
case 256: return ":Skein-256: ";
|
||||
case 512: return ":Skein-512: ";
|
||||
case 1024: return ":Skein-1024:";
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
|
||||
void Skein_Show_Final(uint_t bits,const Skein_Ctxt_Hdr_t *h,size_t cnt,const u08b_t *outPtr)
|
||||
{
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_CONFIG || ((h->T[1] & SKEIN_T1_BLK_TYPE_MASK) != SKEIN_T1_BLK_TYPE_CFG))
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_FINAL)
|
||||
{
|
||||
printf("\n%s Final output=\n",AlgoHeader(bits));
|
||||
Show08(cnt,outPtr);
|
||||
printf(" ++++++++++\n");
|
||||
fflush(stdout);
|
||||
}
|
||||
}
|
||||
|
||||
/* show state after a round (or "pseudo-round") */
|
||||
void Skein_Show_Round(uint_t bits,const Skein_Ctxt_Hdr_t *h,size_t r,const u64b_t *X)
|
||||
{
|
||||
static uint_t injectNum=0; /* not multi-thread safe! */
|
||||
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_CONFIG || ((h->T[1] & SKEIN_T1_BLK_TYPE_MASK) != SKEIN_T1_BLK_TYPE_CFG))
|
||||
if (skein_DebugFlag)
|
||||
{
|
||||
if (r >= SKEIN_RND_SPECIAL)
|
||||
{ /* a key injection (or feedforward) point */
|
||||
injectNum = (r == SKEIN_RND_KEY_INITIAL) ? 0 : injectNum+1;
|
||||
if ( skein_DebugFlag & SKEIN_DEBUG_INJECT ||
|
||||
((skein_DebugFlag & SKEIN_DEBUG_FINAL) && r == SKEIN_RND_FEED_FWD))
|
||||
{
|
||||
printf("\n%s",AlgoHeader(bits));
|
||||
switch (r)
|
||||
{
|
||||
case SKEIN_RND_KEY_INITIAL:
|
||||
printf(" [state after initial key injection]");
|
||||
break;
|
||||
case SKEIN_RND_KEY_INJECT:
|
||||
printf(" [state after key injection #%02d]",injectNum);
|
||||
break;
|
||||
case SKEIN_RND_FEED_FWD:
|
||||
printf(" [state after plaintext feedforward]");
|
||||
injectNum = 0;
|
||||
break;
|
||||
}
|
||||
printf("=\n");
|
||||
Show64(bits/64,X);
|
||||
if (r== SKEIN_RND_FEED_FWD)
|
||||
printf(" ----------\n");
|
||||
}
|
||||
}
|
||||
else if (skein_DebugFlag & SKEIN_DEBUG_ROUNDS)
|
||||
{
|
||||
uint_t j;
|
||||
u64b_t p[SKEIN_MAX_STATE_WORDS];
|
||||
const u08b_t *perm;
|
||||
const static u08b_t PERM_256 [4][ 4] = { { 0,1,2,3 }, { 0,3,2,1 }, { 0,1,2,3 }, { 0,3,2,1 } };
|
||||
const static u08b_t PERM_512 [4][ 8] = { { 0,1,2,3,4,5,6,7 },
|
||||
{ 2,1,4,7,6,5,0,3 },
|
||||
{ 4,1,6,3,0,5,2,7 },
|
||||
{ 6,1,0,7,2,5,4,3 }
|
||||
};
|
||||
const static u08b_t PERM_1024[4][16] = { { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,15 },
|
||||
{ 0, 9, 2,13, 6,11, 4,15,10, 7,12, 3,14, 5, 8, 1 },
|
||||
{ 0, 7, 2, 5, 4, 3, 6, 1,12,15,14,13, 8,11,10, 9 },
|
||||
{ 0,15, 2,11, 6,13, 4, 9,14, 1, 8, 5,10, 3,12, 7 }
|
||||
};
|
||||
|
||||
if ((skein_DebugFlag & SKEIN_DEBUG_PERMUTE) && (r & 3))
|
||||
{
|
||||
printf("\n%s [state after round %2d (permuted)]=\n",AlgoHeader(bits),(int)r);
|
||||
switch (bits)
|
||||
{
|
||||
case 256: perm = PERM_256 [r&3]; break;
|
||||
case 512: perm = PERM_512 [r&3]; break;
|
||||
default: perm = PERM_1024[r&3]; break;
|
||||
}
|
||||
for (j=0;j<bits/64;j++)
|
||||
p[j] = X[perm[j]];
|
||||
Show64(bits/64,p);
|
||||
}
|
||||
else
|
||||
{
|
||||
printf("\n%s [state after round %2d]=\n",AlgoHeader(bits),(int)r);
|
||||
Show64(bits/64,X);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* show state after a round (or "pseudo-round"), given a list of pointers */
|
||||
void Skein_Show_R_Ptr(uint_t bits,const Skein_Ctxt_Hdr_t *h,size_t r,const u64b_t *X_ptr[])
|
||||
{
|
||||
uint_t i;
|
||||
u64b_t X[SKEIN_MAX_STATE_WORDS];
|
||||
|
||||
for (i=0;i<bits/64;i++) /* copy over the words */
|
||||
X[i] = X_ptr[i][0];
|
||||
Skein_Show_Round(bits,h,r,X);
|
||||
}
|
||||
|
||||
|
||||
/* show the state at the start of a block */
|
||||
void Skein_Show_Block(uint_t bits,const Skein_Ctxt_Hdr_t *h,const u64b_t *X,const u08b_t *blkPtr,
|
||||
const u64b_t *wPtr, const u64b_t *ksPtr, const u64b_t *tsPtr)
|
||||
{
|
||||
uint_t n;
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_CONFIG || ((h->T[1] & SKEIN_T1_BLK_TYPE_MASK) != SKEIN_T1_BLK_TYPE_CFG))
|
||||
if (skein_DebugFlag)
|
||||
{
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_HDR)
|
||||
{
|
||||
printf("\n%s Block: outBits=%4d. T0=%06X.",AlgoHeader(bits),(uint_t) h->hashBitLen,(uint_t)h->T[0]);
|
||||
printf(" Type=");
|
||||
n = (uint_t) ((h->T[1] & SKEIN_T1_BLK_TYPE_MASK) >> SKEIN_T1_POS_BLK_TYPE);
|
||||
switch (n)
|
||||
{
|
||||
case SKEIN_BLK_TYPE_KEY: printf("KEY. "); break;
|
||||
case SKEIN_BLK_TYPE_CFG: printf("CFG. "); break;
|
||||
case SKEIN_BLK_TYPE_PERS: printf("PERS."); break;
|
||||
case SKEIN_BLK_TYPE_PK : printf("PK. "); break;
|
||||
case SKEIN_BLK_TYPE_KDF: printf("KDF. "); break;
|
||||
case SKEIN_BLK_TYPE_MSG: printf("MSG. "); break;
|
||||
case SKEIN_BLK_TYPE_OUT: printf("OUT. "); break;
|
||||
default: printf("0x%02X.",n); break;
|
||||
}
|
||||
printf(" Flags=");
|
||||
printf((h->T[1] & SKEIN_T1_FLAG_FIRST) ? " First":" ");
|
||||
printf((h->T[1] & SKEIN_T1_FLAG_FINAL) ? " Final":" ");
|
||||
printf((h->T[1] & SKEIN_T1_FLAG_BIT_PAD) ? " Pad" :" ");
|
||||
n = (uint_t) ((h->T[1] & SKEIN_T1_TREE_LVL_MASK) >> SKEIN_T1_POS_TREE_LVL);
|
||||
if (n)
|
||||
printf(" TreeLevel = %02X",n);
|
||||
printf("\n");
|
||||
fflush(stdout);
|
||||
}
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_TWEAK)
|
||||
{
|
||||
printf(" Tweak:\n");
|
||||
Show64(2,h->T);
|
||||
}
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_STATE)
|
||||
{
|
||||
printf(" %s words:\n",(skein_DebugFlag & SKEIN_DEBUG_THREEFISH)?"Key":"State");
|
||||
Show64(bits/64,X);
|
||||
}
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_KEYSCHED)
|
||||
{
|
||||
printf(" Tweak schedule:\n");
|
||||
Show64_flag(3,tsPtr);
|
||||
printf(" Key schedule:\n");
|
||||
Show64_flag((bits/64)+1,ksPtr);
|
||||
}
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_INPUT_64)
|
||||
{
|
||||
printf(" Input block (words):\n");
|
||||
Show64(bits/64,wPtr);
|
||||
}
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_INPUT_08)
|
||||
{
|
||||
printf(" Input block (bytes):\n");
|
||||
Show08(bits/8,blkPtr);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void Skein_Show_Key(uint_t bits,const Skein_Ctxt_Hdr_t *h,const u08b_t *key,size_t keyBytes)
|
||||
{
|
||||
if (keyBytes)
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_CONFIG || ((h->T[1] & SKEIN_T1_BLK_TYPE_MASK) != SKEIN_T1_BLK_TYPE_CFG))
|
||||
if (skein_DebugFlag & SKEIN_DEBUG_KEY)
|
||||
{
|
||||
printf("\n%s MAC key = %4u bytes\n",AlgoHeader(bits),(unsigned) keyBytes);
|
||||
Show08(keyBytes,key);
|
||||
}
|
||||
}
|
||||
#endif
|
48
sys/crypto/skein/skein_debug.h
Normal file
48
sys/crypto/skein/skein_debug.h
Normal file
@ -0,0 +1,48 @@
|
||||
#ifndef _SKEIN_DEBUG_H_
|
||||
#define _SKEIN_DEBUG_H_
|
||||
/***********************************************************************
|
||||
**
|
||||
** Interface definitions for Skein hashing debug output.
|
||||
**
|
||||
** Source code author: Doug Whiting, 2008.
|
||||
**
|
||||
** This algorithm and source code is released to the public domain.
|
||||
**
|
||||
************************************************************************/
|
||||
|
||||
#ifdef SKEIN_DEBUG
|
||||
/* callout functions used inside Skein code */
|
||||
void Skein_Show_Block(uint_t bits,const Skein_Ctxt_Hdr_t *h,const u64b_t *X,const u08b_t *blkPtr,
|
||||
const u64b_t *wPtr,const u64b_t *ksPtr,const u64b_t *tsPtr);
|
||||
void Skein_Show_Round(uint_t bits,const Skein_Ctxt_Hdr_t *h,size_t r,const u64b_t *X);
|
||||
void Skein_Show_R_Ptr(uint_t bits,const Skein_Ctxt_Hdr_t *h,size_t r,const u64b_t *X_ptr[]);
|
||||
void Skein_Show_Final(uint_t bits,const Skein_Ctxt_Hdr_t *h,size_t cnt,const u08b_t *outPtr);
|
||||
void Skein_Show_Key (uint_t bits,const Skein_Ctxt_Hdr_t *h,const u08b_t *key,size_t keyBytes);
|
||||
|
||||
extern uint_t skein_DebugFlag; /* flags to control debug output (0 --> none) */
|
||||
|
||||
#define SKEIN_RND_SPECIAL (1000u)
|
||||
#define SKEIN_RND_KEY_INITIAL (SKEIN_RND_SPECIAL+0u)
|
||||
#define SKEIN_RND_KEY_INJECT (SKEIN_RND_SPECIAL+1u)
|
||||
#define SKEIN_RND_FEED_FWD (SKEIN_RND_SPECIAL+2u)
|
||||
|
||||
/* flag bits: skein_DebugFlag */
|
||||
#define SKEIN_DEBUG_KEY (1u << 1) /* show MAC key */
|
||||
#define SKEIN_DEBUG_CONFIG (1u << 2) /* show config block processing */
|
||||
#define SKEIN_DEBUG_STATE (1u << 3) /* show input state during Show_Block() */
|
||||
#define SKEIN_DEBUG_TWEAK (1u << 4) /* show input state during Show_Block() */
|
||||
#define SKEIN_DEBUG_KEYSCHED (1u << 5) /* show expanded key schedule */
|
||||
#define SKEIN_DEBUG_INPUT_64 (1u << 6) /* show input block as 64-bit words */
|
||||
#define SKEIN_DEBUG_INPUT_08 (1u << 7) /* show input block as 8-bit bytes */
|
||||
#define SKEIN_DEBUG_INJECT (1u << 8) /* show state after key injection & feedforward points */
|
||||
#define SKEIN_DEBUG_ROUNDS (1u << 9) /* show state after all rounds */
|
||||
#define SKEIN_DEBUG_FINAL (1u <<10) /* show final output of Skein */
|
||||
#define SKEIN_DEBUG_HDR (1u <<11) /* show block header */
|
||||
#define SKEIN_DEBUG_THREEFISH (1u <<12) /* use Threefish name instead of Skein */
|
||||
#define SKEIN_DEBUG_PERMUTE (1u <<13) /* use word permutations */
|
||||
#define SKEIN_DEBUG_ALL ((~0u) & ~(SKEIN_DEBUG_THREEFISH | SKEIN_DEBUG_PERMUTE))
|
||||
#define THREEFISH_DEBUG_ALL (SKEIN_DEBUG_ALL | SKEIN_DEBUG_THREEFISH)
|
||||
|
||||
#endif /* SKEIN_DEBUG */
|
||||
|
||||
#endif /* _SKEIN_DEBUG_H_ */
|
79
sys/crypto/skein/skein_freebsd.h
Normal file
79
sys/crypto/skein/skein_freebsd.h
Normal file
@ -0,0 +1,79 @@
|
||||
/*-
|
||||
* Copyright 2016 Allan Jude
|
||||
* All rights reserved.
|
||||
*
|
||||
* Redistribution and use in source and binary forms, with or without
|
||||
* modification, are permitted provided that the following conditions
|
||||
* are met:
|
||||
* 1. Redistributions of source code must retain the above copyright
|
||||
* notice, this list of conditions and the following disclaimer.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
* documentation and/or other materials provided with the distribution.
|
||||
*
|
||||
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* $FreeBSD$
|
||||
*/
|
||||
|
||||
#ifndef _SKEIN_FREEBSD_H_
|
||||
#define _SKEIN_FREEBSD_H_
|
||||
|
||||
#define SKEIN_256_BLOCK_BYTES ( 8*SKEIN_256_STATE_WORDS)
|
||||
#define SKEIN_512_BLOCK_BYTES ( 8*SKEIN_512_STATE_WORDS)
|
||||
#define SKEIN1024_BLOCK_BYTES ( 8*SKEIN1024_STATE_WORDS)
|
||||
|
||||
#define SKEIN256_BLOCK_LENGTH SKEIN_256_BLOCK_BYTES
|
||||
#define SKEIN256_DIGEST_LENGTH 32
|
||||
#define SKEIN256_DIGEST_STRING_LENGTH (SKEIN256_DIGEST_LENGTH * 2 + 1)
|
||||
#define SKEIN512_BLOCK_LENGTH SKEIN_512_BLOCK_BYTES
|
||||
#define SKEIN512_DIGEST_LENGTH 64
|
||||
#define SKEIN512_DIGEST_STRING_LENGTH (SKEIN512_DIGEST_LENGTH * 2 + 1)
|
||||
#define SKEIN1024_BLOCK_LENGTH SKEIN1024_BLOCK_BYTES
|
||||
#define SKEIN1024_DIGEST_LENGTH 128
|
||||
#define SKEIN1024_DIGEST_STRING_LENGTH (SKEIN1024_DIGEST_LENGTH * 2 + 1)
|
||||
|
||||
/* Make the context types look like the other hashes on FreeBSD */
|
||||
typedef Skein_256_Ctxt_t SKEIN256_CTX;
|
||||
typedef Skein_512_Ctxt_t SKEIN512_CTX;
|
||||
typedef Skein1024_Ctxt_t SKEIN1024_CTX;
|
||||
|
||||
/* Make the prototypes look like the other hashes */
|
||||
void SKEIN256_Init (SKEIN256_CTX *ctx);
|
||||
void SKEIN512_Init (SKEIN512_CTX *ctx);
|
||||
void SKEIN1024_Init (SKEIN1024_CTX *ctx);
|
||||
|
||||
void SKEIN256_Update(SKEIN256_CTX *ctx, const void *in, size_t len);
|
||||
void SKEIN512_Update(SKEIN512_CTX *ctx, const void *in, size_t len);
|
||||
void SKEIN1024_Update(SKEIN1024_CTX *ctx, const void *in, size_t len);
|
||||
|
||||
void SKEIN256_Final(unsigned char digest[static SKEIN256_DIGEST_LENGTH], SKEIN256_CTX *ctx);
|
||||
void SKEIN512_Final(unsigned char digest[static SKEIN512_DIGEST_LENGTH], SKEIN512_CTX *ctx);
|
||||
void SKEIN1024_Final(unsigned char digest[static SKEIN1024_DIGEST_LENGTH], SKEIN1024_CTX *ctx);
|
||||
|
||||
#ifndef _KERNEL
|
||||
char *SKEIN256_End(SKEIN256_CTX *, char *);
|
||||
char *SKEIN512_End(SKEIN512_CTX *, char *);
|
||||
char *SKEIN1024_End(SKEIN1024_CTX *, char *);
|
||||
char *SKEIN256_Data(const void *, unsigned int, char *);
|
||||
char *SKEIN512_Data(const void *, unsigned int, char *);
|
||||
char *SKEIN1024_Data(const void *, unsigned int, char *);
|
||||
char *SKEIN256_File(const char *, char *);
|
||||
char *SKEIN512_File(const char *, char *);
|
||||
char *SKEIN1024_File(const char *, char *);
|
||||
char *SKEIN256_FileChunk(const char *, char *, off_t, off_t);
|
||||
char *SKEIN512_FileChunk(const char *, char *, off_t, off_t);
|
||||
char *SKEIN1024_FileChunk(const char *, char *, off_t, off_t);
|
||||
#endif
|
||||
|
||||
#endif /* ifndef _SKEIN_FREEBSD_H_ */
|
200
sys/crypto/skein/skein_iv.h
Normal file
200
sys/crypto/skein/skein_iv.h
Normal file
@ -0,0 +1,200 @@
|
||||
/* $FreeBSD$ */
|
||||
#ifndef _SKEIN_IV_H_
|
||||
#define _SKEIN_IV_H_
|
||||
|
||||
#include "skein.h" /* get Skein macros and types */
|
||||
|
||||
/*
|
||||
***************** Pre-computed Skein IVs *******************
|
||||
**
|
||||
** NOTE: these values are not "magic" constants, but
|
||||
** are generated using the Threefish block function.
|
||||
** They are pre-computed here only for speed; i.e., to
|
||||
** avoid the need for a Threefish call during Init().
|
||||
**
|
||||
** The IV for any fixed hash length may be pre-computed.
|
||||
** Only the most common values are included here.
|
||||
**
|
||||
************************************************************
|
||||
**/
|
||||
|
||||
#define MK_64 SKEIN_MK_64
|
||||
|
||||
/* blkSize = 256 bits. hashSize = 128 bits */
|
||||
const u64b_t SKEIN_256_IV_128[] =
|
||||
{
|
||||
MK_64(0xE1111906,0x964D7260),
|
||||
MK_64(0x883DAAA7,0x7C8D811C),
|
||||
MK_64(0x10080DF4,0x91960F7A),
|
||||
MK_64(0xCCF7DDE5,0xB45BC1C2)
|
||||
};
|
||||
|
||||
/* blkSize = 256 bits. hashSize = 160 bits */
|
||||
const u64b_t SKEIN_256_IV_160[] =
|
||||
{
|
||||
MK_64(0x14202314,0x72825E98),
|
||||
MK_64(0x2AC4E9A2,0x5A77E590),
|
||||
MK_64(0xD47A5856,0x8838D63E),
|
||||
MK_64(0x2DD2E496,0x8586AB7D)
|
||||
};
|
||||
|
||||
/* blkSize = 256 bits. hashSize = 224 bits */
|
||||
const u64b_t SKEIN_256_IV_224[] =
|
||||
{
|
||||
MK_64(0xC6098A8C,0x9AE5EA0B),
|
||||
MK_64(0x876D5686,0x08C5191C),
|
||||
MK_64(0x99CB88D7,0xD7F53884),
|
||||
MK_64(0x384BDDB1,0xAEDDB5DE)
|
||||
};
|
||||
|
||||
/* blkSize = 256 bits. hashSize = 256 bits */
|
||||
const u64b_t SKEIN_256_IV_256[] =
|
||||
{
|
||||
MK_64(0xFC9DA860,0xD048B449),
|
||||
MK_64(0x2FCA6647,0x9FA7D833),
|
||||
MK_64(0xB33BC389,0x6656840F),
|
||||
MK_64(0x6A54E920,0xFDE8DA69)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 128 bits */
|
||||
const u64b_t SKEIN_512_IV_128[] =
|
||||
{
|
||||
MK_64(0xA8BC7BF3,0x6FBF9F52),
|
||||
MK_64(0x1E9872CE,0xBD1AF0AA),
|
||||
MK_64(0x309B1790,0xB32190D3),
|
||||
MK_64(0xBCFBB854,0x3F94805C),
|
||||
MK_64(0x0DA61BCD,0x6E31B11B),
|
||||
MK_64(0x1A18EBEA,0xD46A32E3),
|
||||
MK_64(0xA2CC5B18,0xCE84AA82),
|
||||
MK_64(0x6982AB28,0x9D46982D)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 160 bits */
|
||||
const u64b_t SKEIN_512_IV_160[] =
|
||||
{
|
||||
MK_64(0x28B81A2A,0xE013BD91),
|
||||
MK_64(0xC2F11668,0xB5BDF78F),
|
||||
MK_64(0x1760D8F3,0xF6A56F12),
|
||||
MK_64(0x4FB74758,0x8239904F),
|
||||
MK_64(0x21EDE07F,0x7EAF5056),
|
||||
MK_64(0xD908922E,0x63ED70B8),
|
||||
MK_64(0xB8EC76FF,0xECCB52FA),
|
||||
MK_64(0x01A47BB8,0xA3F27A6E)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 224 bits */
|
||||
const u64b_t SKEIN_512_IV_224[] =
|
||||
{
|
||||
MK_64(0xCCD06162,0x48677224),
|
||||
MK_64(0xCBA65CF3,0xA92339EF),
|
||||
MK_64(0x8CCD69D6,0x52FF4B64),
|
||||
MK_64(0x398AED7B,0x3AB890B4),
|
||||
MK_64(0x0F59D1B1,0x457D2BD0),
|
||||
MK_64(0x6776FE65,0x75D4EB3D),
|
||||
MK_64(0x99FBC70E,0x997413E9),
|
||||
MK_64(0x9E2CFCCF,0xE1C41EF7)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 256 bits */
|
||||
const u64b_t SKEIN_512_IV_256[] =
|
||||
{
|
||||
MK_64(0xCCD044A1,0x2FDB3E13),
|
||||
MK_64(0xE8359030,0x1A79A9EB),
|
||||
MK_64(0x55AEA061,0x4F816E6F),
|
||||
MK_64(0x2A2767A4,0xAE9B94DB),
|
||||
MK_64(0xEC06025E,0x74DD7683),
|
||||
MK_64(0xE7A436CD,0xC4746251),
|
||||
MK_64(0xC36FBAF9,0x393AD185),
|
||||
MK_64(0x3EEDBA18,0x33EDFC13)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 384 bits */
|
||||
const u64b_t SKEIN_512_IV_384[] =
|
||||
{
|
||||
MK_64(0xA3F6C6BF,0x3A75EF5F),
|
||||
MK_64(0xB0FEF9CC,0xFD84FAA4),
|
||||
MK_64(0x9D77DD66,0x3D770CFE),
|
||||
MK_64(0xD798CBF3,0xB468FDDA),
|
||||
MK_64(0x1BC4A666,0x8A0E4465),
|
||||
MK_64(0x7ED7D434,0xE5807407),
|
||||
MK_64(0x548FC1AC,0xD4EC44D6),
|
||||
MK_64(0x266E1754,0x6AA18FF8)
|
||||
};
|
||||
|
||||
/* blkSize = 512 bits. hashSize = 512 bits */
|
||||
const u64b_t SKEIN_512_IV_512[] =
|
||||
{
|
||||
MK_64(0x4903ADFF,0x749C51CE),
|
||||
MK_64(0x0D95DE39,0x9746DF03),
|
||||
MK_64(0x8FD19341,0x27C79BCE),
|
||||
MK_64(0x9A255629,0xFF352CB1),
|
||||
MK_64(0x5DB62599,0xDF6CA7B0),
|
||||
MK_64(0xEABE394C,0xA9D5C3F4),
|
||||
MK_64(0x991112C7,0x1A75B523),
|
||||
MK_64(0xAE18A40B,0x660FCC33)
|
||||
};
|
||||
|
||||
/* blkSize = 1024 bits. hashSize = 384 bits */
|
||||
const u64b_t SKEIN1024_IV_384[] =
|
||||
{
|
||||
MK_64(0x5102B6B8,0xC1894A35),
|
||||
MK_64(0xFEEBC9E3,0xFE8AF11A),
|
||||
MK_64(0x0C807F06,0xE32BED71),
|
||||
MK_64(0x60C13A52,0xB41A91F6),
|
||||
MK_64(0x9716D35D,0xD4917C38),
|
||||
MK_64(0xE780DF12,0x6FD31D3A),
|
||||
MK_64(0x797846B6,0xC898303A),
|
||||
MK_64(0xB172C2A8,0xB3572A3B),
|
||||
MK_64(0xC9BC8203,0xA6104A6C),
|
||||
MK_64(0x65909338,0xD75624F4),
|
||||
MK_64(0x94BCC568,0x4B3F81A0),
|
||||
MK_64(0x3EBBF51E,0x10ECFD46),
|
||||
MK_64(0x2DF50F0B,0xEEB08542),
|
||||
MK_64(0x3B5A6530,0x0DBC6516),
|
||||
MK_64(0x484B9CD2,0x167BBCE1),
|
||||
MK_64(0x2D136947,0xD4CBAFEA)
|
||||
};
|
||||
|
||||
/* blkSize = 1024 bits. hashSize = 512 bits */
|
||||
const u64b_t SKEIN1024_IV_512[] =
|
||||
{
|
||||
MK_64(0xCAEC0E5D,0x7C1B1B18),
|
||||
MK_64(0xA01B0E04,0x5F03E802),
|
||||
MK_64(0x33840451,0xED912885),
|
||||
MK_64(0x374AFB04,0xEAEC2E1C),
|
||||
MK_64(0xDF25A0E2,0x813581F7),
|
||||
MK_64(0xE4004093,0x8B12F9D2),
|
||||
MK_64(0xA662D539,0xC2ED39B6),
|
||||
MK_64(0xFA8B85CF,0x45D8C75A),
|
||||
MK_64(0x8316ED8E,0x29EDE796),
|
||||
MK_64(0x053289C0,0x2E9F91B8),
|
||||
MK_64(0xC3F8EF1D,0x6D518B73),
|
||||
MK_64(0xBDCEC3C4,0xD5EF332E),
|
||||
MK_64(0x549A7E52,0x22974487),
|
||||
MK_64(0x67070872,0x5B749816),
|
||||
MK_64(0xB9CD28FB,0xF0581BD1),
|
||||
MK_64(0x0E2940B8,0x15804974)
|
||||
};
|
||||
|
||||
/* blkSize = 1024 bits. hashSize = 1024 bits */
|
||||
const u64b_t SKEIN1024_IV_1024[] =
|
||||
{
|
||||
MK_64(0xD593DA07,0x41E72355),
|
||||
MK_64(0x15B5E511,0xAC73E00C),
|
||||
MK_64(0x5180E5AE,0xBAF2C4F0),
|
||||
MK_64(0x03BD41D3,0xFCBCAFAF),
|
||||
MK_64(0x1CAEC6FD,0x1983A898),
|
||||
MK_64(0x6E510B8B,0xCDD0589F),
|
||||
MK_64(0x77E2BDFD,0xC6394ADA),
|
||||
MK_64(0xC11E1DB5,0x24DCB0A3),
|
||||
MK_64(0xD6D14AF9,0xC6329AB5),
|
||||
MK_64(0x6A9B0BFC,0x6EB67E0D),
|
||||
MK_64(0x9243C60D,0xCCFF1332),
|
||||
MK_64(0x1A1F1DDE,0x743F02D4),
|
||||
MK_64(0x0996753C,0x10ED0BB8),
|
||||
MK_64(0x6572DD22,0xF2B4969A),
|
||||
MK_64(0x61FD3062,0xD00A579A),
|
||||
MK_64(0x1DE0536E,0x8682E539)
|
||||
};
|
||||
|
||||
#endif /* _SKEIN_IV_H_ */
|
156
sys/crypto/skein/skein_port.h
Normal file
156
sys/crypto/skein/skein_port.h
Normal file
@ -0,0 +1,156 @@
|
||||
/* $FreeBSD$ */
|
||||
#ifndef _SKEIN_PORT_H_
|
||||
#define _SKEIN_PORT_H_
|
||||
/*******************************************************************
|
||||
**
|
||||
** Platform-specific definitions for Skein hash function.
|
||||
**
|
||||
** Source code author: Doug Whiting, 2008.
|
||||
**
|
||||
** This algorithm and source code is released to the public domain.
|
||||
**
|
||||
** Many thanks to Brian Gladman for his portable header files.
|
||||
**
|
||||
** To port Skein to an "unsupported" platform, change the definitions
|
||||
** in this file appropriately.
|
||||
**
|
||||
********************************************************************/
|
||||
|
||||
#include <sys/endian.h>
|
||||
#include <sys/types.h>
|
||||
|
||||
typedef unsigned int uint_t; /* native unsigned integer */
|
||||
typedef u_int8_t u08b_t; /* 8-bit unsigned integer */
|
||||
typedef u_int32_t uint_32t; /* 32-bit unsigned integer */
|
||||
typedef u_int64_t u64b_t; /* 64-bit unsigned integer */
|
||||
|
||||
#ifndef RotL_64
|
||||
#define RotL_64(x,N) (((x) << (N)) | ((x) >> (64-(N))))
|
||||
#endif
|
||||
|
||||
__BEGIN_DECLS
|
||||
|
||||
/*
|
||||
* Skein is "natively" little-endian (unlike SHA-xxx), for optimal
|
||||
* performance on x86 CPUs. The Skein code requires the following
|
||||
* definitions for dealing with endianness:
|
||||
*
|
||||
* SKEIN_NEED_SWAP: 0 for little-endian, 1 for big-endian
|
||||
* Skein_Put64_LSB_First
|
||||
* Skein_Get64_LSB_First
|
||||
* Skein_Swap64
|
||||
*
|
||||
* If SKEIN_NEED_SWAP is defined at compile time, it is used here
|
||||
* along with the portable versions of Put64/Get64/Swap64, which
|
||||
* are slow in general.
|
||||
*
|
||||
* Otherwise, an "auto-detect" of endianness is attempted below.
|
||||
* If the default handling doesn't work well, the user may insert
|
||||
* platform-specific code instead (e.g., for big-endian CPUs).
|
||||
*
|
||||
*/
|
||||
#ifndef SKEIN_NEED_SWAP /* compile-time "override" for endianness? */
|
||||
|
||||
#if BYTE_ORDER == BIG_ENDIAN
|
||||
/* here for big-endian CPUs */
|
||||
#define SKEIN_NEED_SWAP (1)
|
||||
#ifdef SKEIN_PORT_CODE
|
||||
void Skein_Put64_LSB_First(u08b_t *dst,const u64b_t *src,size_t bCnt);
|
||||
void Skein_Get64_LSB_First(u64b_t *dst,const u08b_t *src,size_t wCnt);
|
||||
#endif /* ifdef SKEIN_PORT_CODE */
|
||||
#elif BYTE_ORDER == LITTLE_ENDIAN
|
||||
/* here for x86 and x86-64 CPUs (and other detected little-endian CPUs) */
|
||||
#define SKEIN_NEED_SWAP (0)
|
||||
#define Skein_Put64_LSB_First(dst08,src64,bCnt) memcpy(dst08,src64,bCnt)
|
||||
#define Skein_Get64_LSB_First(dst64,src08,wCnt) memcpy(dst64,src08,8*(wCnt))
|
||||
#else
|
||||
#error "Skein needs endianness setting!"
|
||||
#endif
|
||||
|
||||
#endif /* ifndef SKEIN_NEED_SWAP */
|
||||
|
||||
/*
|
||||
******************************************************************
|
||||
* Provide any definitions still needed.
|
||||
******************************************************************
|
||||
*/
|
||||
#ifndef Skein_Swap64 /* swap for big-endian, nop for little-endian */
|
||||
#if SKEIN_NEED_SWAP
|
||||
#define Skein_Swap64(w64) bswap64(w64)
|
||||
#else
|
||||
#define Skein_Swap64(w64) (w64)
|
||||
#endif
|
||||
#endif /* ifndef Skein_Swap64 */
|
||||
|
||||
|
||||
#ifndef Skein_Put64_LSB_First
|
||||
void Skein_Put64_LSB_First(u08b_t *dst,const u64b_t *src,size_t bCnt)
|
||||
#ifdef SKEIN_PORT_CODE /* instantiate the function code here? */
|
||||
{
|
||||
size_t n;
|
||||
|
||||
for (n = 0; n < bCnt / 8; n++)
|
||||
le64enc(dst + n * 8, src[n]);
|
||||
}
|
||||
#else
|
||||
; /* output only the function prototype */
|
||||
#endif
|
||||
#endif /* ifndef Skein_Put64_LSB_First */
|
||||
|
||||
|
||||
#ifndef Skein_Get64_LSB_First
|
||||
void Skein_Get64_LSB_First(u64b_t *dst,const u08b_t *src,size_t wCnt)
|
||||
#ifdef SKEIN_PORT_CODE /* instantiate the function code here? */
|
||||
{
|
||||
size_t n;
|
||||
|
||||
for (n = 0; n < wCnt; n++)
|
||||
dst[n] = le64dec(src + n * 8);
|
||||
}
|
||||
#else
|
||||
; /* output only the function prototype */
|
||||
#endif
|
||||
#endif /* ifndef Skein_Get64_LSB_First */
|
||||
|
||||
/* Start FreeBSD libmd shims */
|
||||
|
||||
/* Ensure libmd symbols do not clash with libcrypto */
|
||||
#ifndef SKEIN256_Init
|
||||
#define SKEIN256_Init _libmd_SKEIN256_Init
|
||||
#define SKEIN512_Init _libmd_SKEIN512_Init
|
||||
#define SKEIN1024_Init _libmd_SKEIN1024_Init
|
||||
#endif
|
||||
#ifndef SKEIN256_Update
|
||||
#define SKEIN256_Update _libmd_SKEIN256_Update
|
||||
#define SKEIN512_Update _libmd_SKEIN512_Update
|
||||
#define SKEIN1024_Update _libmd_SKEIN1024_Update
|
||||
#endif
|
||||
#ifndef SKEIN256_Final
|
||||
#define SKEIN256_Final _libmd_SKEIN256_Final
|
||||
#define SKEIN512_Final _libmd_SKEIN512_Final
|
||||
#define SKEIN1024_Final _libmd_SKEIN1024_Final
|
||||
#endif
|
||||
#ifndef SKEIN256_End
|
||||
#define SKEIN256_End _libmd_SKEIN256_End
|
||||
#define SKEIN512_End _libmd_SKEIN512_End
|
||||
#define SKEIN1024_End _libmd_SKEIN1024_End
|
||||
#endif
|
||||
#ifndef SKEIN256_File
|
||||
#define SKEIN256_File _libmd_SKEIN256_File
|
||||
#define SKEIN512_File _libmd_SKEIN512_File
|
||||
#define SKEIN1024_File _libmd_SKEIN1024_File
|
||||
#endif
|
||||
#ifndef SKEIN256_FileChunk
|
||||
#define SKEIN256_FileChunk _libmd_SKEIN256_FileChunk
|
||||
#define SKEIN512_FileChunk _libmd_SKEIN512_FileChunk
|
||||
#define SKEIN1024_FileChunk _libmd_SKEIN1024_FileChunk
|
||||
#endif
|
||||
#ifndef SKEIN256_Data
|
||||
#define SKEIN256_Data _libmd_SKEIN256_Data
|
||||
#define SKEIN512_Data _libmd_SKEIN512_Data
|
||||
#define SKEIN1024_Data _libmd_SKEIN1024_Data
|
||||
#endif
|
||||
|
||||
__END_DECLS
|
||||
|
||||
#endif /* ifndef _SKEIN_PORT_H_ */
|
@ -8,6 +8,7 @@
|
||||
.PATH: ${.CURDIR}/../../crypto/rijndael
|
||||
.PATH: ${.CURDIR}/../../crypto/sha2
|
||||
.PATH: ${.CURDIR}/../../crypto/siphash
|
||||
.PATH: ${.CURDIR}/../../crypto/skein
|
||||
|
||||
KMOD = crypto
|
||||
SRCS = crypto.c cryptodev_if.c
|
||||
@ -17,6 +18,13 @@ SRCS += skipjack.c bf_enc.c bf_ecb.c bf_skey.c
|
||||
SRCS += camellia.c camellia-api.c
|
||||
SRCS += des_ecb.c des_enc.c des_setkey.c
|
||||
SRCS += sha1.c sha256c.c sha512c.c
|
||||
SRCS += skein.c skein_block.c
|
||||
.if exists(${MACHINE_ARCH}/skein_block_asm.s)
|
||||
.PATH: ${.CURDIR}/../../crypto/skein/${MACHINE_ARCH}
|
||||
SRCS += skein_block_asm.s
|
||||
CFLAGS += -DSKEIN_ASM -DSKEIN_USE_ASM=1792 # list of block functions to replace with assembly: 256+512+1024 = 1792
|
||||
ACFLAGS += -DELF -Wa,--noexecstack
|
||||
.endif
|
||||
SRCS += siphash.c
|
||||
SRCS += gmac.c gfmult.c
|
||||
SRCS += opt_param.h cryptodev_if.h bus_if.h device_if.h
|
||||
|
Loading…
Reference in New Issue
Block a user