diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libcrypto/sha/sha3.c | 172 |
1 files changed, 0 insertions, 172 deletions
diff --git a/src/lib/libcrypto/sha/sha3.c b/src/lib/libcrypto/sha/sha3.c deleted file mode 100644 index 6a7196d582..0000000000 --- a/src/lib/libcrypto/sha/sha3.c +++ /dev/null | |||
| @@ -1,172 +0,0 @@ | |||
| 1 | /* $OpenBSD: sha3.c,v 1.16 2024/11/23 15:38:12 jsing Exp $ */ | ||
| 2 | /* | ||
| 3 | * The MIT License (MIT) | ||
| 4 | * | ||
| 5 | * Copyright (c) 2015 Markku-Juhani O. Saarinen | ||
| 6 | * | ||
| 7 | * Permission is hereby granted, free of charge, to any person obtaining a copy | ||
| 8 | * of this software and associated documentation files (the "Software"), to deal | ||
| 9 | * in the Software without restriction, including without limitation the rights | ||
| 10 | * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | ||
| 11 | * copies of the Software, and to permit persons to whom the Software is | ||
| 12 | * furnished to do so, subject to the following conditions: | ||
| 13 | * | ||
| 14 | * The above copyright notice and this permission notice shall be included in all | ||
| 15 | * copies or substantial portions of the Software. | ||
| 16 | * | ||
| 17 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | ||
| 18 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | ||
| 19 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE | ||
| 20 | * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | ||
| 21 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, | ||
| 22 | * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | ||
| 23 | * SOFTWARE. | ||
| 24 | */ | ||
| 25 | |||
| 26 | #include <endian.h> | ||
| 27 | #include <string.h> | ||
| 28 | |||
| 29 | #include "sha3_internal.h" | ||
| 30 | |||
| 31 | #define KECCAKF_ROUNDS 24 | ||
| 32 | |||
| 33 | #define ROTL64(x, y) (((x) << (y)) | ((x) >> (64 - (y)))) | ||
| 34 | |||
| 35 | static const uint64_t sha3_keccakf_rndc[24] = { | ||
| 36 | 0x0000000000000001, 0x0000000000008082, 0x800000000000808a, | ||
| 37 | 0x8000000080008000, 0x000000000000808b, 0x0000000080000001, | ||
| 38 | 0x8000000080008081, 0x8000000000008009, 0x000000000000008a, | ||
| 39 | 0x0000000000000088, 0x0000000080008009, 0x000000008000000a, | ||
| 40 | 0x000000008000808b, 0x800000000000008b, 0x8000000000008089, | ||
| 41 | 0x8000000000008003, 0x8000000000008002, 0x8000000000000080, | ||
| 42 | 0x000000000000800a, 0x800000008000000a, 0x8000000080008081, | ||
| 43 | 0x8000000000008080, 0x0000000080000001, 0x8000000080008008 | ||
| 44 | }; | ||
| 45 | static const int sha3_keccakf_rotc[24] = { | ||
| 46 | 1, 3, 6, 10, 15, 21, 28, 36, 45, 55, 2, 14, | ||
| 47 | 27, 41, 56, 8, 25, 43, 62, 18, 39, 61, 20, 44 | ||
| 48 | }; | ||
| 49 | static const int sha3_keccakf_piln[24] = { | ||
| 50 | 10, 7, 11, 17, 18, 3, 5, 16, 8, 21, 24, 4, | ||
| 51 | 15, 23, 19, 13, 12, 2, 20, 14, 22, 9, 6, 1 | ||
| 52 | }; | ||
| 53 | |||
| 54 | static void | ||
| 55 | sha3_keccakf(uint64_t st[25]) | ||
| 56 | { | ||
| 57 | uint64_t t, bc[5]; | ||
| 58 | int i, j, r; | ||
| 59 | |||
| 60 | for (i = 0; i < 25; i++) | ||
| 61 | st[i] = le64toh(st[i]); | ||
| 62 | |||
| 63 | for (r = 0; r < KECCAKF_ROUNDS; r++) { | ||
| 64 | |||
| 65 | /* Theta */ | ||
| 66 | for (i = 0; i < 5; i++) | ||
| 67 | bc[i] = st[i] ^ st[i + 5] ^ st[i + 10] ^ st[i + 15] ^ st[i + 20]; | ||
| 68 | |||
| 69 | for (i = 0; i < 5; i++) { | ||
| 70 | t = bc[(i + 4) % 5] ^ ROTL64(bc[(i + 1) % 5], 1); | ||
| 71 | for (j = 0; j < 25; j += 5) | ||
| 72 | st[j + i] ^= t; | ||
| 73 | } | ||
| 74 | |||
| 75 | /* Rho Pi */ | ||
| 76 | t = st[1]; | ||
| 77 | for (i = 0; i < 24; i++) { | ||
| 78 | j = sha3_keccakf_piln[i]; | ||
| 79 | bc[0] = st[j]; | ||
| 80 | st[j] = ROTL64(t, sha3_keccakf_rotc[i]); | ||
| 81 | t = bc[0]; | ||
| 82 | } | ||
| 83 | |||
| 84 | /* Chi */ | ||
| 85 | for (j = 0; j < 25; j += 5) { | ||
| 86 | for (i = 0; i < 5; i++) | ||
| 87 | bc[i] = st[j + i]; | ||
| 88 | for (i = 0; i < 5; i++) | ||
| 89 | st[j + i] ^= (~bc[(i + 1) % 5]) & bc[(i + 2) % 5]; | ||
| 90 | } | ||
| 91 | |||
| 92 | /* Iota */ | ||
| 93 | st[0] ^= sha3_keccakf_rndc[r]; | ||
| 94 | } | ||
| 95 | |||
| 96 | for (i = 0; i < 25; i++) | ||
| 97 | st[i] = htole64(st[i]); | ||
| 98 | } | ||
| 99 | |||
| 100 | int | ||
| 101 | sha3_init(sha3_ctx *c, int mdlen) | ||
| 102 | { | ||
| 103 | if (mdlen < 0 || mdlen >= KECCAK_BYTE_WIDTH / 2) | ||
| 104 | return 0; | ||
| 105 | |||
| 106 | memset(c, 0, sizeof(*c)); | ||
| 107 | |||
| 108 | c->mdlen = mdlen; | ||
| 109 | c->rsize = KECCAK_BYTE_WIDTH - 2 * mdlen; | ||
| 110 | |||
| 111 | return 1; | ||
| 112 | } | ||
| 113 | |||
| 114 | int | ||
| 115 | sha3_update(sha3_ctx *c, const void *data, size_t len) | ||
| 116 | { | ||
| 117 | size_t i, j; | ||
| 118 | |||
| 119 | j = c->pt; | ||
| 120 | for (i = 0; i < len; i++) { | ||
| 121 | c->state.b[j++] ^= ((const uint8_t *) data)[i]; | ||
| 122 | if (j >= c->rsize) { | ||
| 123 | sha3_keccakf(c->state.q); | ||
| 124 | j = 0; | ||
| 125 | } | ||
| 126 | } | ||
| 127 | c->pt = j; | ||
| 128 | |||
| 129 | return 1; | ||
| 130 | } | ||
| 131 | |||
| 132 | int | ||
| 133 | sha3_final(void *md, sha3_ctx *c) | ||
| 134 | { | ||
| 135 | int i; | ||
| 136 | |||
| 137 | c->state.b[c->pt] ^= 0x06; | ||
| 138 | c->state.b[c->rsize - 1] ^= 0x80; | ||
| 139 | sha3_keccakf(c->state.q); | ||
| 140 | |||
| 141 | for (i = 0; i < c->mdlen; i++) { | ||
| 142 | ((uint8_t *) md)[i] = c->state.b[i]; | ||
| 143 | } | ||
| 144 | |||
| 145 | return 1; | ||
| 146 | } | ||
| 147 | |||
| 148 | /* SHAKE128 and SHAKE256 extensible-output functionality. */ | ||
| 149 | void | ||
| 150 | shake_xof(sha3_ctx *c) | ||
| 151 | { | ||
| 152 | c->state.b[c->pt] ^= 0x1F; | ||
| 153 | c->state.b[c->rsize - 1] ^= 0x80; | ||
| 154 | sha3_keccakf(c->state.q); | ||
| 155 | c->pt = 0; | ||
| 156 | } | ||
| 157 | |||
| 158 | void | ||
| 159 | shake_out(sha3_ctx *c, void *out, size_t len) | ||
| 160 | { | ||
| 161 | size_t i, j; | ||
| 162 | |||
| 163 | j = c->pt; | ||
| 164 | for (i = 0; i < len; i++) { | ||
| 165 | if (j >= c->rsize) { | ||
| 166 | sha3_keccakf(c->state.q); | ||
| 167 | j = 0; | ||
| 168 | } | ||
| 169 | ((uint8_t *) out)[i] = c->state.b[j++]; | ||
| 170 | } | ||
| 171 | c->pt = j; | ||
| 172 | } | ||
