blob: 535e09be55ac3172e4c77c3172afcc0848249ddf [file] [log] [blame]
// Copyright 2019 Brian Smith.
//
// Permission to use, copy, modify, and/or distribute this software for any
// purpose with or without fee is hereby granted, provided that the above
// copyright notice and this permission notice appear in all copies.
//
// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES
// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
// SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
// OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
// CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
use crate::c;
use core::{
num::Wrapping,
ops::{Add, AddAssign, BitAnd, BitOr, BitXor, Not, Shr},
};
#[cfg(not(any(target_arch = "aarch64", target_arch = "arm", target_arch = "x86_64")))]
pub(super) extern "C" fn sha256_block_data_order(
state: &mut super::State,
data: *const u8,
num: c::size_t,
) {
let state = unsafe { &mut state.as32 };
*state = block_data_order(*state, data, num)
}
#[cfg(not(any(target_arch = "aarch64", target_arch = "arm", target_arch = "x86_64")))]
pub(super) extern "C" fn sha512_block_data_order(
state: &mut super::State,
data: *const u8,
num: c::size_t,
) {
let state = unsafe { &mut state.as64 };
*state = block_data_order(*state, data, num)
}
#[cfg_attr(
any(target_arch = "aarch64", target_arch = "arm", target_arch = "x86_64"),
allow(dead_code)
)]
#[inline]
fn block_data_order<S: Sha2>(
mut H: [S; CHAINING_WORDS],
M: *const u8,
num: c::size_t,
) -> [S; CHAINING_WORDS] {
let M = M as *const [S::InputBytes; 16];
let M: &[[S::InputBytes; 16]] = unsafe { core::slice::from_raw_parts(M, num) };
for M in M {
// FIPS 180-4 {6.2.2, 6.4.2} Step 1
//
// TODO: Use `let W: [S::ZERO; S::ROUNDS]` instead of allocating
// `MAX_ROUNDS` items and then slicing to `K.len()`; depends on
// https://github.com/rust-lang/rust/issues/43408.
let mut W = [S::ZERO; MAX_ROUNDS];
let W: &[S] = {
let W = &mut W[..S::K.len()];
for (W, M) in W.iter_mut().zip(M) {
*W = S::from_be_bytes(*M);
}
for t in M.len()..S::K.len() {
W[t] = sigma_1(W[t - 2]) + W[t - 7] + sigma_0(W[t - 15]) + W[t - 16]
}
W
};
// FIPS 180-4 {6.2.2, 6.4.2} Step 2
let [mut a, mut b, mut c, mut d, mut e, mut f, mut g, mut h] = H;
// FIPS 180-4 {6.2.2, 6.4.2} Step 3
for (Kt, Wt) in S::K.iter().zip(W.iter()) {
let T1 = h + SIGMA_1(e) + ch(e, f, g) + *Kt + *Wt;
let T2 = SIGMA_0(a) + maj(a, b, c);
h = g;
g = f;
f = e;
e = d + T1;
d = c;
c = b;
b = a;
a = T1 + T2;
}
// FIPS 180-4 {6.2.2, 6.4.2} Step 4
H[0] += a;
H[1] += b;
H[2] += c;
H[3] += d;
H[4] += e;
H[5] += f;
H[6] += g;
H[7] += h;
}
H
}
// FIPS 180-4 {4.1.1, 4.1.2, 4.1.3}
#[inline(always)]
pub(super) fn ch<W: Word>(x: W, y: W, z: W) -> W {
(x & y) | (!x & z)
}
// FIPS 180-4 {4.1.1, 4.1.2, 4.1.3}
#[inline(always)]
pub(super) fn maj<W: Word>(x: W, y: W, z: W) -> W {
(x & y) | (x & z) | (y & z)
}
// FIPS 180-4 {4.1.2, 4.1.3}
#[inline(always)]
fn SIGMA_0<S: Sha2>(x: S) -> S {
x.rotr(S::BIG_SIGMA_0.0) ^ x.rotr(S::BIG_SIGMA_0.1) ^ x.rotr(S::BIG_SIGMA_0.2)
}
// FIPS 180-4 {4.1.2, 4.1.3}
#[inline(always)]
fn SIGMA_1<S: Sha2>(x: S) -> S {
x.rotr(S::BIG_SIGMA_1.0) ^ x.rotr(S::BIG_SIGMA_1.1) ^ x.rotr(S::BIG_SIGMA_1.2)
}
// FIPS 180-4 {4.1.2, 4.1.3}
#[inline(always)]
fn sigma_0<S: Sha2>(x: S) -> S {
x.rotr(S::SMALL_SIGMA_0.0) ^ x.rotr(S::SMALL_SIGMA_0.1) ^ (x >> S::SMALL_SIGMA_0.2)
}
// FIPS 180-4 {4.1.2, 4.1.3}
#[inline(always)]
fn sigma_1<S: Sha2>(x: S) -> S {
x.rotr(S::SMALL_SIGMA_1.0) ^ x.rotr(S::SMALL_SIGMA_1.1) ^ (x >> S::SMALL_SIGMA_1.2)
}
// Commonality between SHA-1 and SHA-2 words.
pub(super) trait Word:
'static
+ Sized
+ Copy
+ Add<Output = Self>
+ AddAssign
+ BitAnd<Output = Self>
+ BitOr<Output = Self>
+ Not<Output = Self>
{
const ZERO: Self;
type InputBytes: Copy;
fn from_be_bytes(input: Self::InputBytes) -> Self;
fn rotr(self, count: u32) -> Self;
}
/// A SHA-2 input word.
trait Sha2: Word + BitXor<Output = Self> + Shr<usize, Output = Self> {
const BIG_SIGMA_0: (u32, u32, u32);
const BIG_SIGMA_1: (u32, u32, u32);
const SMALL_SIGMA_0: (u32, u32, usize);
const SMALL_SIGMA_1: (u32, u32, usize);
const K: &'static [Self];
}
const MAX_ROUNDS: usize = 80;
pub(super) const CHAINING_WORDS: usize = 8;
impl Word for Wrapping<u32> {
const ZERO: Self = Self(0);
type InputBytes = [u8; 4];
#[inline(always)]
fn from_be_bytes(input: Self::InputBytes) -> Self {
Self(u32::from_be_bytes(input))
}
#[inline(always)]
fn rotr(self, count: u32) -> Self {
Self(self.0.rotate_right(count))
}
}
// SHA-256
impl Sha2 for Wrapping<u32> {
// FIPS 180-4 4.1.2
const BIG_SIGMA_0: (u32, u32, u32) = (2, 13, 22);
const BIG_SIGMA_1: (u32, u32, u32) = (6, 11, 25);
const SMALL_SIGMA_0: (u32, u32, usize) = (7, 18, 3);
const SMALL_SIGMA_1: (u32, u32, usize) = (17, 19, 10);
// FIPS 180-4 4.2.2
const K: &'static [Self] = &[
Self(0x428a2f98),
Self(0x71374491),
Self(0xb5c0fbcf),
Self(0xe9b5dba5),
Self(0x3956c25b),
Self(0x59f111f1),
Self(0x923f82a4),
Self(0xab1c5ed5),
Self(0xd807aa98),
Self(0x12835b01),
Self(0x243185be),
Self(0x550c7dc3),
Self(0x72be5d74),
Self(0x80deb1fe),
Self(0x9bdc06a7),
Self(0xc19bf174),
Self(0xe49b69c1),
Self(0xefbe4786),
Self(0x0fc19dc6),
Self(0x240ca1cc),
Self(0x2de92c6f),
Self(0x4a7484aa),
Self(0x5cb0a9dc),
Self(0x76f988da),
Self(0x983e5152),
Self(0xa831c66d),
Self(0xb00327c8),
Self(0xbf597fc7),
Self(0xc6e00bf3),
Self(0xd5a79147),
Self(0x06ca6351),
Self(0x14292967),
Self(0x27b70a85),
Self(0x2e1b2138),
Self(0x4d2c6dfc),
Self(0x53380d13),
Self(0x650a7354),
Self(0x766a0abb),
Self(0x81c2c92e),
Self(0x92722c85),
Self(0xa2bfe8a1),
Self(0xa81a664b),
Self(0xc24b8b70),
Self(0xc76c51a3),
Self(0xd192e819),
Self(0xd6990624),
Self(0xf40e3585),
Self(0x106aa070),
Self(0x19a4c116),
Self(0x1e376c08),
Self(0x2748774c),
Self(0x34b0bcb5),
Self(0x391c0cb3),
Self(0x4ed8aa4a),
Self(0x5b9cca4f),
Self(0x682e6ff3),
Self(0x748f82ee),
Self(0x78a5636f),
Self(0x84c87814),
Self(0x8cc70208),
Self(0x90befffa),
Self(0xa4506ceb),
Self(0xbef9a3f7),
Self(0xc67178f2),
];
}
impl Word for Wrapping<u64> {
const ZERO: Self = Self(0);
type InputBytes = [u8; 8];
#[inline(always)]
fn from_be_bytes(input: Self::InputBytes) -> Self {
Self(u64::from_be_bytes(input))
}
#[inline(always)]
fn rotr(self, count: u32) -> Self {
Self(self.0.rotate_right(count))
}
}
// SHA-384 and SHA-512
impl Sha2 for Wrapping<u64> {
// FIPS 180-4 4.1.3
const BIG_SIGMA_0: (u32, u32, u32) = (28, 34, 39);
const BIG_SIGMA_1: (u32, u32, u32) = (14, 18, 41);
const SMALL_SIGMA_0: (u32, u32, usize) = (1, 8, 7);
const SMALL_SIGMA_1: (u32, u32, usize) = (19, 61, 6);
// FIPS 180-4 4.2.3
const K: &'static [Self] = &[
Self(0x428a2f98d728ae22),
Self(0x7137449123ef65cd),
Self(0xb5c0fbcfec4d3b2f),
Self(0xe9b5dba58189dbbc),
Self(0x3956c25bf348b538),
Self(0x59f111f1b605d019),
Self(0x923f82a4af194f9b),
Self(0xab1c5ed5da6d8118),
Self(0xd807aa98a3030242),
Self(0x12835b0145706fbe),
Self(0x243185be4ee4b28c),
Self(0x550c7dc3d5ffb4e2),
Self(0x72be5d74f27b896f),
Self(0x80deb1fe3b1696b1),
Self(0x9bdc06a725c71235),
Self(0xc19bf174cf692694),
Self(0xe49b69c19ef14ad2),
Self(0xefbe4786384f25e3),
Self(0x0fc19dc68b8cd5b5),
Self(0x240ca1cc77ac9c65),
Self(0x2de92c6f592b0275),
Self(0x4a7484aa6ea6e483),
Self(0x5cb0a9dcbd41fbd4),
Self(0x76f988da831153b5),
Self(0x983e5152ee66dfab),
Self(0xa831c66d2db43210),
Self(0xb00327c898fb213f),
Self(0xbf597fc7beef0ee4),
Self(0xc6e00bf33da88fc2),
Self(0xd5a79147930aa725),
Self(0x06ca6351e003826f),
Self(0x142929670a0e6e70),
Self(0x27b70a8546d22ffc),
Self(0x2e1b21385c26c926),
Self(0x4d2c6dfc5ac42aed),
Self(0x53380d139d95b3df),
Self(0x650a73548baf63de),
Self(0x766a0abb3c77b2a8),
Self(0x81c2c92e47edaee6),
Self(0x92722c851482353b),
Self(0xa2bfe8a14cf10364),
Self(0xa81a664bbc423001),
Self(0xc24b8b70d0f89791),
Self(0xc76c51a30654be30),
Self(0xd192e819d6ef5218),
Self(0xd69906245565a910),
Self(0xf40e35855771202a),
Self(0x106aa07032bbd1b8),
Self(0x19a4c116b8d2d0c8),
Self(0x1e376c085141ab53),
Self(0x2748774cdf8eeb99),
Self(0x34b0bcb5e19b48a8),
Self(0x391c0cb3c5c95a63),
Self(0x4ed8aa4ae3418acb),
Self(0x5b9cca4f7763e373),
Self(0x682e6ff3d6b2b8a3),
Self(0x748f82ee5defb2fc),
Self(0x78a5636f43172f60),
Self(0x84c87814a1f0ab72),
Self(0x8cc702081a6439ec),
Self(0x90befffa23631e28),
Self(0xa4506cebde82bde9),
Self(0xbef9a3f7b2c67915),
Self(0xc67178f2e372532b),
Self(0xca273eceea26619c),
Self(0xd186b8c721c0c207),
Self(0xeada7dd6cde0eb1e),
Self(0xf57d4f7fee6ed178),
Self(0x06f067aa72176fba),
Self(0x0a637dc5a2c898a6),
Self(0x113f9804bef90dae),
Self(0x1b710b35131c471b),
Self(0x28db77f523047d84),
Self(0x32caab7b40c72493),
Self(0x3c9ebe0a15c9bebc),
Self(0x431d67c49c100d4c),
Self(0x4cc5d4becb3e42b6),
Self(0x597f299cfc657e2a),
Self(0x5fcb6fab3ad6faec),
Self(0x6c44198c4a475817),
];
}
#[cfg(any(target_arch = "aarch64", target_arch = "arm", target_arch = "x86_64"))]
prefixed_extern! {
pub(super) fn sha256_block_data_order(
state: &mut super::State,
data: *const u8,
num: c::size_t,
);
pub(super) fn sha512_block_data_order(
state: &mut super::State,
data: *const u8,
num: c::size_t,
);
}