Skip to content

Commit

Permalink
supercop-20091009
Browse files Browse the repository at this point in the history
  • Loading branch information
Daniel J. Bernstein authored and floodyberry committed Oct 9, 2009
1 parent 82ebbfe commit c3194be
Show file tree
Hide file tree
Showing 16 changed files with 5,533 additions and 1 deletion.
9 changes: 9 additions & 0 deletions crypto_hash/blake32/ssse3/README
@@ -0,0 +1,9 @@
BLAKE-32 ssse3 eBASH implementation
authors: Jean-Philippe Aumasson <jeanphilippe.aumasson@gmail.com>
Peter Schwabe <peter@cryptojedi.org>
Samuel Neves <sneves@dei.uc.pt>

This implementation assumes that no salt is used.

Level of copyright protection: 0
Level of patent protection: 0
1 change: 1 addition & 0 deletions crypto_hash/blake32/ssse3/api.h
@@ -0,0 +1 @@
#define CRYPTO_BYTES 32
351 changes: 351 additions & 0 deletions crypto_hash/blake32/ssse3/hash.c
@@ -0,0 +1,351 @@
#include <string.h>
#include <stdio.h>
#include <emmintrin.h>
#include <tmmintrin.h>
#include "crypto_hash.h"

typedef unsigned long long u64;
typedef unsigned int u32;
typedef unsigned char u8;

#define U8TO32(p) \
(((u32)((p)[0]) << 24) | ((u32)((p)[1]) << 16) | \
((u32)((p)[2]) << 8) | ((u32)((p)[3]) ))
#define U32TO8(p, v) \
(p)[0] = (u8)((v) >> 24); (p)[1] = (u8)((v) >> 16); \
(p)[2] = (u8)((v) >> 8); (p)[3] = (u8)((v) );

typedef struct {
u32 h[8], s[4], t[2];
int buflen, nullt;
u8 buf[64];
} state;

const u8 sigma[][16] = {
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,15 },
{14,10, 4, 8, 9,15,13, 6, 1,12, 0, 2,11, 7, 5, 3 },
{11, 8,12, 0, 5, 2,15,13,10,14, 3, 6, 7, 1, 9, 4 },
{ 7, 9, 3, 1,13,12,11,14, 2, 6, 5,10, 4, 0,15, 8 },
{ 9, 0, 5, 7, 2, 4,10,15,14, 1,11,12, 6, 8, 3,13 },
{ 2,12, 6,10, 0,11, 8, 3, 4,13, 7, 5,15,14, 1, 9 },
{12, 5, 1,15,14,13, 4,10, 0, 7, 6, 3, 9, 2, 8,11 },
{13,11, 7,14,12, 1, 3, 9, 5, 0,15, 4, 8, 6, 2,10 },
{ 6,15,14, 9,11, 3, 0, 8,12, 2,13, 7, 1, 4,10, 5 },
{10, 2, 8, 4, 7, 6, 1, 5,15,11, 9,14, 3,12,13 ,0 },
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14,15 },
{14,10, 4, 8, 9,15,13, 6, 1,12, 0, 2,11, 7, 5, 3 },
{11, 8,12, 0, 5, 2,15,13,10,14, 3, 6, 7, 1, 9, 4 },
{ 7, 9, 3, 1,13,12,11,14, 2, 6, 5,10, 4, 0,15, 8 },
{ 9, 0, 5, 7, 2, 4,10,15,14, 1,11,12, 6, 8, 3,13 },
{ 2,12, 6,10, 0,11, 8, 3, 4,13, 7, 5,15,14, 1, 9 },
{12, 5, 1,15,14,13, 4,10, 0, 7, 6, 3, 9, 2, 8,11 },
{13,11, 7,14,12, 1, 3, 9, 5, 0,15, 4, 8, 6, 2,10 },
{ 6,15,14, 9,11, 3, 0, 8,12, 2,13, 7, 1, 4,10, 5 },
{10, 2, 8, 4, 7, 6, 1, 5,15,11, 9,14, 3,12,13 ,0 }};

const u32 cst[16] = {
0x243F6A88,0x85A308D3,0x13198A2E,0x03707344,
0xA4093822,0x299F31D0,0x082EFA98,0xEC4E6C89,
0x452821E6,0x38D01377,0xBE5466CF,0x34E90C6C,
0xC0AC29B7,0xC97C50DD,0x3F84D5B5,0xB5470917};

const u8 padding[] =
{0x80,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0};



static int blake32_compress( state * state, const u8 * datablock ) {

__m128i row1,row2,row3,row4;
__m128i buf1,buf2;
static const u8 rot8[16] = {1,2,3,0,5,6,7,4,9,10,11,8,13,14,15,12};
static const u8 rot16[16] = {2,3,0,1,6,7,4,5,10,11,8,9,14,15,12,13};
__m128i r8 = _mm_load_si128((__m128i*)rot8);
__m128i r16 = _mm_load_si128((__m128i*)rot16);


u32 m[16];
int r;
u64 t;

static const int sig[][16] = {
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } ,
{ 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } ,
{ 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 } ,
{ 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 } ,
{ 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 } ,
{ 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 } ,
{ 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 } ,
{ 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 } ,
{ 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 } ,
{ 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13 , 0 },
};
static const u32 z[16] = {
0x243F6A88, 0x85A308D3, 0x13198A2E, 0x03707344,
0xA4093822, 0x299F31D0, 0x082EFA98, 0xEC4E6C89,
0x452821E6, 0x38D01377, 0xBE5466CF, 0x34E90C6C,
0xC0AC29B7, 0xC97C50DD, 0x3F84D5B5, 0xB5470917
};

/* get message */
m[ 0] = U8TO32(datablock + 0);
m[ 1] = U8TO32(datablock + 4);
m[ 2] = U8TO32(datablock + 8);
m[ 3] = U8TO32(datablock +12);
m[ 4] = U8TO32(datablock +16);
m[ 5] = U8TO32(datablock +20);
m[ 6] = U8TO32(datablock +24);
m[ 7] = U8TO32(datablock +28);
m[ 8] = U8TO32(datablock +32);
m[ 9] = U8TO32(datablock +36);
m[10] = U8TO32(datablock +40);
m[11] = U8TO32(datablock +44);
m[12] = U8TO32(datablock +48);
m[13] = U8TO32(datablock +52);
m[14] = U8TO32(datablock +56);
m[15] = U8TO32(datablock +60);

row1 = _mm_set_epi32(state->h[ 3], state->h[ 2],
state->h[ 1], state->h[ 0]);
row2 = _mm_set_epi32(state->h[ 7], state->h[ 6],
state->h[ 5], state->h[ 4]);
row3 = _mm_set_epi32(0x03707344, 0x13198A2E, 0x85A308D3, 0x243F6A88);

if (state->nullt)
row4 = _mm_set_epi32(0xEC4E6C89, 0x082EFA98, 0x299F31D0, 0xA4093822);
else
row4 = _mm_set_epi32(0xEC4E6C89^state->t[1], 0x082EFA98^state->t[1],
0x299F31D0^state->t[0], 0xA4093822^state->t[0]);

#define round(r) \
/* column step */ \
buf1 = _mm_set_epi32(m[sig[r][ 6]], \
m[sig[r][ 4]], \
m[sig[r][ 2]], \
m[sig[r][ 0]]); \
buf2 = _mm_set_epi32(z[sig[r][ 7]], \
z[sig[r][ 5]], \
z[sig[r][ 3]], \
z[sig[r][ 1]]); \
buf1 = _mm_xor_si128( buf1, buf2); \
row1 = _mm_add_epi32( _mm_add_epi32( row1, buf1), row2 ); \
buf1 = _mm_set_epi32(z[sig[r][ 6]], \
z[sig[r][ 4]], \
z[sig[r][ 2]], \
z[sig[r][ 0]]); \
buf2 = _mm_set_epi32(m[sig[r][ 7]], \
m[sig[r][ 5]], \
m[sig[r][ 3]], \
m[sig[r][ 1]]); \
row4 = _mm_xor_si128( row4, row1 ); \
row4 = _mm_shuffle_epi8(row4, r16); \
row3 = _mm_add_epi32( row3, row4 ); \
row2 = _mm_xor_si128( row2, row3 ); \
buf1 = _mm_xor_si128( buf1, buf2); \
row2 = _mm_xor_si128(_mm_srli_epi32( row2, 12 ),_mm_slli_epi32( row2, 20 )); \
row1 = _mm_add_epi32( _mm_add_epi32( row1, buf1), row2 ); \
row4 = _mm_xor_si128( row4, row1 ); \
row4 = _mm_shuffle_epi8(row4, r8); \
row3 = _mm_add_epi32( row3, row4 ); \
row4 = _mm_shuffle_epi32( row4, _MM_SHUFFLE(2,1,0,3) ); \
row2 = _mm_xor_si128( row2, row3 ); \
row2 = _mm_xor_si128(_mm_srli_epi32( row2, 7 ),_mm_slli_epi32( row2, 25 )); \
\
row3 = _mm_shuffle_epi32( row3, _MM_SHUFFLE(1,0,3,2) ); \
row2 = _mm_shuffle_epi32( row2, _MM_SHUFFLE(0,3,2,1) ); \
\
/* diagonal step */ \
buf1 = _mm_set_epi32(m[sig[r][14]], \
m[sig[r][12]], \
m[sig[r][10]], \
m[sig[r][ 8]]); \
buf2 = _mm_set_epi32(z[sig[r][15]], \
z[sig[r][13]], \
z[sig[r][11]], \
z[sig[r][ 9]]); \
buf1 = _mm_xor_si128( buf1, buf2); \
row1 = _mm_add_epi32( _mm_add_epi32( row1, buf1 ), row2 ); \
buf1 = _mm_set_epi32(z[sig[r][14]], \
z[sig[r][12]], \
z[sig[r][10]], \
z[sig[r][ 8]]); \
buf2 = _mm_set_epi32(m[sig[r][15]], \
m[sig[r][13]], \
m[sig[r][11]], \
m[sig[r][ 9]]); \
row4 = _mm_xor_si128( row4, row1 ); \
buf1 = _mm_xor_si128( buf1, buf2); \
row4 = _mm_shuffle_epi8(row4, r16); \
row3 = _mm_add_epi32( row3, row4 ); \
row2 = _mm_xor_si128( row2, row3 ); \
row2 = _mm_xor_si128(_mm_srli_epi32( row2, 12 ),_mm_slli_epi32( row2, 20 )); \
row1 = _mm_add_epi32( _mm_add_epi32( row1, buf1 ), row2 ); \
row4 = _mm_xor_si128( row4, row1 ); \
row4 = _mm_shuffle_epi8(row4, r8); \
row3 = _mm_add_epi32( row3, row4 ); \
row4 = _mm_shuffle_epi32( row4, _MM_SHUFFLE(0,3,2,1) ); \
row2 = _mm_xor_si128( row2, row3 ); \
row2 = _mm_xor_si128(_mm_srli_epi32( row2, 7 ),_mm_slli_epi32( row2, 25 )); \
\
row3 = _mm_shuffle_epi32( row3, _MM_SHUFFLE(1,0,3,2) ); \
row2 = _mm_shuffle_epi32( row2, _MM_SHUFFLE(2,1,0,3) ); \
\

round(0);
round(1);
round(2);
round(3);
round(4);
round(5);
round(6);
round(7);
round(8);
round(9);

_mm_store_si128( (__m128i *)m, _mm_xor_si128(row1,row3));
state->h[0] ^= m[ 0];
state->h[1] ^= m[ 1];
state->h[2] ^= m[ 2];
state->h[3] ^= m[ 3];
_mm_store_si128( (__m128i *)m, _mm_xor_si128(row2,row4));
state->h[4] ^= m[ 0];
state->h[5] ^= m[ 1];
state->h[6] ^= m[ 2];
state->h[7] ^= m[ 3];

return 0;
}


void blake32_init( state *S ) {

S->h[0]=0x6A09E667;
S->h[1]=0xBB67AE85;
S->h[2]=0x3C6EF372;
S->h[3]=0xA54FF53A;
S->h[4]=0x510E527F;
S->h[5]=0x9B05688C;
S->h[6]=0x1F83D9AB;
S->h[7]=0x5BE0CD19;
S->t[0]=S->t[1]=S->buflen=S->nullt=0;
S->s[0]=S->s[1]=S->s[2]=S->s[3] =0;
}


void blake32_update( state *S, const u8 *data, u64 datalen ) {

int left=S->buflen >> 3;
int fill=64 - left;

if( left && ( ((datalen >> 3) & 0x3F) >= fill ) ) {
memcpy( (void*) (S->buf + left), (void*) data, fill );
S->t[0] += 512;
if (S->t[0] == 0) S->t[1]++;
blake32_compress( S, S->buf );
data += fill;
datalen -= (fill << 3);
left = 0;
}

while( datalen >= 512 ) {
S->t[0] += 512;
if (S->t[0] == 0) S->t[1]++;
blake32_compress( S, data );
data += 64;
datalen -= 512;
}

if( datalen > 0 ) {
memcpy( (void*) (S->buf + left), (void*) data, datalen>>3 );
S->buflen = (left<<3) + datalen;
}
else S->buflen=0;
}


void blake32_final( state *S, u8 *digest ) {

u8 msglen[8], zo=0x01, oo=0x81;
u32 lo=S->t[0] + S->buflen, hi=S->t[1];
if ( lo < S->buflen ) hi++;
U32TO8( msglen + 0, hi );
U32TO8( msglen + 4, lo );

if ( S->buflen == 440 ) { /* one padding byte */
S->t[0] -= 8;
blake32_update( S, &oo, 8 );
}
else {
if ( S->buflen < 440 ) { /* enough space to fill the block */
if ( !S->buflen ) S->nullt=1;
S->t[0] -= 440 - S->buflen;
blake32_update( S, padding, 440 - S->buflen );
}
else { /* need 2 compressions */
S->t[0] -= 512 - S->buflen;
blake32_update( S, padding, 512 - S->buflen );
S->t[0] -= 440;
blake32_update( S, padding+1, 440 );
S->nullt = 1;
}
blake32_update( S, &zo, 8 );
S->t[0] -= 8;
}
S->t[0] -= 64;
blake32_update( S, msglen, 64 );

U32TO8( digest + 0, S->h[0]);
U32TO8( digest + 4, S->h[1]);
U32TO8( digest + 8, S->h[2]);
U32TO8( digest +12, S->h[3]);
U32TO8( digest +16, S->h[4]);
U32TO8( digest +20, S->h[5]);
U32TO8( digest +24, S->h[6]);
U32TO8( digest +28, S->h[7]);
}


void crypto_hash( unsigned char *out, const unsigned char *in, unsigned long long inlen ) {

state S;
blake32_init( &S );
blake32_update( &S, in, inlen*8 );
blake32_final( &S, out );
}

/*
int main() {
int i, v;
u8 data[72], digest[32];
u8 test1[]= {0xD1, 0xE3, 0x9B, 0x45, 0x7D, 0x22, 0x50, 0xB4, 0xF5, 0xB1, 0x52, 0xE7, 0x41, 0x57, 0xFB, 0xA4, \
0xC1, 0xB4, 0x23, 0xB8, 0x75, 0x49, 0x10, 0x6B, 0x07, 0xFD, 0x3A, 0x3E, 0x7F, 0x4A, 0xEB, 0x28};
u8 test2[]= {0x8A, 0x63, 0x84, 0x88, 0xC3, 0x18, 0xC5, 0xA8, 0x22, 0x2A, 0x18, 0x13, 0x17, 0x4C, 0x36, 0xB4, \
0xBB, 0x66, 0xE4, 0x5B, 0x09, 0xAF, 0xDD, 0xFD, 0x7F, 0x2B, 0x2F, 0xE3, 0x16, 0x1B, 0x7A, 0x6D};
for(i=0; i<72; ++i) data[i]=0;
crypto_hash( digest, data, 1 );
v=0;
for(i=0; i<32; ++i) {
printf("%02X", digest[i]);
if ( digest[i] != test1[i]) v=1;
}
if (v) printf("\nerror\n");
else printf("\nok\n");
for(i=0; i<72; ++i) data[i]=0;
crypto_hash( digest, data, 72 );
v=0;
for(i=0; i<32; ++i) {
printf("%02X", digest[i]);
if ( digest[i] != test2[i]) v=1;
}
if (v) printf("\nerror\n");
else printf("\nok\n");
return 0;
}
*/
9 changes: 9 additions & 0 deletions crypto_hash/blake64/ssse3/README
@@ -0,0 +1,9 @@
BLAKE-64 ssse3 eBASH implementation
authors: Jean-Philippe Aumasson <jeanphilippe.aumasson@gmail.com>
Peter Schwabe <peter@cryptojedi.org>
Samuel Neves <sneves@dei.uc.pt>

This implementation assumes that no salt is used.

Level of copyright protection: 0
Level of patent protection: 0
1 change: 1 addition & 0 deletions crypto_hash/blake64/ssse3/api.h
@@ -0,0 +1 @@
#define CRYPTO_BYTES 64

0 comments on commit c3194be

Please sign in to comment.