Codebase list gost-crypto / fresh-snapshots/upstream gosthash94_generic.c
fresh-snapshots/upstream

Tree @fresh-snapshots/upstream (Download .tar.gz)

gosthash94_generic.c @fresh-snapshots/upstreamraw · history · blame

/* gosthash94.c - an implementation of GOST Hash Function
 *
 * based on the Russian Standard GOST R 34.11-94.
 * English description in RFC 5831.
 * See also RFC 4357.
 *
 * Copyright: 2018 Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
 * Copyright: 2009-2012 Aleksey Kravchenko <rhash.admin@gmail.com>
 *
 * Permission is hereby granted, free of charge, to any person obtaining a
 * copy of this software and associated documentation files (the
 * "Software"), to deal in the Software without restriction, including
 * without limitation the rights to use, copy, modify, merge, publish,
 * distribute, sublicense, and/or sell copies of the Software, and to
 * permit persons to whom the Software is furnished to do so, subject to
 * the following conditions:
 *
 * The above copyright notice and this permission notice shall be included
 * in all copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
 * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
 * IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
 * CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
 * TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
 * SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
 */

#include <linux/crypto.h>
#include <linux/module.h>

#include <asm/byteorder.h>
#include <asm/unaligned.h>

#include <crypto/internal/hash.h>
#include <crypto/gost28147.h>
#include <crypto/gosthash94.h>

struct crypto_gosthash94_ctx {
	u32 hash[8];		/* algorithm 256-bit state */
	u32 sum[8];		/* sum of processed message blocks */
	u8 message[GOSTHASH94_BLOCK_SIZE]; /* 256-bit buffer */
	u64 length;		/* number of processed bytes */
};

static void
gost_block_compress(struct crypto_gosthash94_ctx *ctx, const u32 *block,
		    const u32 *sbox)
{
	unsigned int i;
	u32 key[8], u[8], v[8], w[8], s[8];

	/* u := hash, v := <256-bit message block> */
	memcpy(u, ctx->hash, sizeof(u));
	memcpy(v, block, sizeof(v));

	/* w := u xor v */
	w[0] = u[0] ^ v[0];
	w[1] = u[1] ^ v[1];
	w[2] = u[2] ^ v[2];
	w[3] = u[3] ^ v[3];
	w[4] = u[4] ^ v[4];
	w[5] = u[5] ^ v[5];
	w[6] = u[6] ^ v[6];
	w[7] = u[7] ^ v[7];

	/* calculate keys, encrypt hash and store result to the s[] array */
	for (i = 0;; i += 2) {
		/* key generation: key_i := P(w) */
		key[0] =
		    (w[0] & 0x000000ff) | ((w[2] & 0x000000ff) << 8) |
		    ((w[4] & 0x000000ff) << 16) | ((w[6] & 0x000000ff) << 24);
		key[1] =
		    ((w[0] & 0x0000ff00) >> 8) | (w[2] & 0x0000ff00) |
		    ((w[4] & 0x0000ff00) << 8) | ((w[6] & 0x0000ff00) << 16);
		key[2] =
		    ((w[0] & 0x00ff0000) >> 16) | ((w[2] & 0x00ff0000) >> 8) |
		    (w[4] & 0x00ff0000) | ((w[6] & 0x00ff0000) << 8);
		key[3] =
		    ((w[0] & 0xff000000) >> 24) | ((w[2] & 0xff000000) >> 16) |
		    ((w[4] & 0xff000000) >> 8) | (w[6] & 0xff000000);
		key[4] =
		    (w[1] & 0x000000ff) | ((w[3] & 0x000000ff) << 8) |
		    ((w[5] & 0x000000ff) << 16) | ((w[7] & 0x000000ff) << 24);
		key[5] =
		    ((w[1] & 0x0000ff00) >> 8) | (w[3] & 0x0000ff00) |
		    ((w[5] & 0x0000ff00) << 8) | ((w[7] & 0x0000ff00) << 16);
		key[6] =
		    ((w[1] & 0x00ff0000) >> 16) | ((w[3] & 0x00ff0000) >> 8) |
		    (w[5] & 0x00ff0000) | ((w[7] & 0x00ff0000) << 8);
		key[7] =
		    ((w[1] & 0xff000000) >> 24) | ((w[3] & 0xff000000) >> 16) |
		    ((w[5] & 0xff000000) >> 8) | (w[7] & 0xff000000);

		/* encryption: s_i := E_{key_i} (h_i) */
		crypto_gost28147_encrypt(key, sbox, &ctx->hash[i], &s[i]);

		if (i == 0) {
			/* w:= A(u) ^ A^2(v) */
			w[0] = u[2] ^ v[4];
			w[1] = u[3] ^ v[5];
			w[2] = u[4] ^ v[6];
			w[3] = u[5] ^ v[7];
			w[4] = u[6] ^ (v[0] ^= v[2]);
			w[5] = u[7] ^ (v[1] ^= v[3]);
			w[6] = (u[0] ^= u[2]) ^ (v[2] ^= v[4]);
			w[7] = (u[1] ^= u[3]) ^ (v[3] ^= v[5]);
		} else if ((i & 2) != 0) {
			if (i == 6)
				break;

			/* w := A^2(u) xor A^4(v) xor C_3; u := A(u) xor C_3 */
			/* C_3=0xff00ffff000000ffff0000ff00ffff0000ff00ff00ff00ffff00ff00ff00ff00 */
			u[2] ^= u[4] ^ 0x000000ff;
			u[3] ^= u[5] ^ 0xff00ffff;
			u[4] ^= 0xff00ff00;
			u[5] ^= 0xff00ff00;
			u[6] ^= 0x00ff00ff;
			u[7] ^= 0x00ff00ff;
			u[0] ^= 0x00ffff00;
			u[1] ^= 0xff0000ff;

			w[0] = u[4] ^ v[0];
			w[2] = u[6] ^ v[2];
			w[4] = u[0] ^ (v[4] ^= v[6]);
			w[6] = u[2] ^ (v[6] ^= v[0]);
			w[1] = u[5] ^ v[1];
			w[3] = u[7] ^ v[3];
			w[5] = u[1] ^ (v[5] ^= v[7]);
			w[7] = u[3] ^ (v[7] ^= v[1]);
		} else {
			/* i==4 here */
			/* w:= A( A^2(u) xor C_3 ) xor A^6(v) */
			w[0] = u[6] ^ v[4];
			w[1] = u[7] ^ v[5];
			w[2] = u[0] ^ v[6];
			w[3] = u[1] ^ v[7];
			w[4] = u[2] ^ (v[0] ^= v[2]);
			w[5] = u[3] ^ (v[1] ^= v[3]);
			w[6] = (u[4] ^= u[6]) ^ (v[2] ^= v[4]);
			w[7] = (u[5] ^= u[7]) ^ (v[3] ^= v[5]);
		}
	}

	/*
	 * step hash function:
	 * x(block, hash) := psi^61(hash xor psi(block xor psi^12(S)))
	 */

	/* 12 rounds of the LFSR and xor in <message block> */
	u[0] = block[0] ^ s[6];
	u[1] = block[1] ^ s[7];
	u[2] =
	    block[2] ^ (s[0] << 16) ^ (s[0] >> 16) ^ (s[0] & 0xffff) ^ (s[1] &
									0xffff)
	    ^ (s[1] >> 16) ^ (s[2] << 16) ^ s[6] ^ (s[6] << 16) ^ (s[7] &
								   0xffff0000)
	    ^ (s[7] >> 16);
	u[3] =
	    block[3] ^ (s[0] & 0xffff) ^ (s[0] << 16) ^ (s[1] & 0xffff) ^ (s[1]
									   <<
									   16)
	    ^ (s[1] >> 16) ^ (s[2] << 16) ^ (s[2] >> 16) ^ (s[3] << 16) ^ s[6]
	    ^ (s[6] << 16) ^ (s[6] >> 16) ^ (s[7] & 0xffff) ^ (s[7] << 16) ^
	    (s[7] >> 16);
	u[4] =
	    block[4] ^ (s[0] & 0xffff0000) ^ (s[0] << 16) ^ (s[0] >> 16) ^
	    (s[1] & 0xffff0000) ^ (s[1] >> 16) ^ (s[2] << 16) ^ (s[2] >> 16) ^
	    (s[3] << 16) ^ (s[3] >> 16) ^ (s[4] << 16) ^ (s[6] << 16) ^ (s[6]
									 >> 16)
	    ^ (s[7] & 0xffff) ^ (s[7] << 16) ^ (s[7] >> 16);
	u[5] =
	    block[5] ^ (s[0] << 16) ^ (s[0] >> 16) ^ (s[0] & 0xffff0000) ^
	    (s[1] & 0xffff) ^ s[2] ^ (s[2] >> 16) ^ (s[3] << 16) ^ (s[3] >> 16)
	    ^ (s[4] << 16) ^ (s[4] >> 16) ^ (s[5] << 16) ^ (s[6] << 16) ^ (s[6]
									   >>
									   16)
	    ^ (s[7] & 0xffff0000) ^ (s[7] << 16) ^ (s[7] >> 16);
	u[6] =
	    block[6] ^ s[0] ^ (s[1] >> 16) ^ (s[2] << 16) ^ s[3] ^ (s[3] >> 16)
	    ^ (s[4] << 16) ^ (s[4] >> 16) ^ (s[5] << 16) ^ (s[5] >> 16) ^ s[6]
	    ^ (s[6] << 16) ^ (s[6] >> 16) ^ (s[7] << 16);
	u[7] =
	    block[7] ^ (s[0] & 0xffff0000) ^ (s[0] << 16) ^ (s[1] & 0xffff) ^
	    (s[1] << 16) ^ (s[2] >> 16) ^ (s[3] << 16) ^ s[4] ^ (s[4] >> 16) ^
	    (s[5] << 16) ^ (s[5] >> 16) ^ (s[6] >> 16) ^ (s[7] & 0xffff) ^
	    (s[7] << 16) ^ (s[7] >> 16);

	/* 1 round of the LFSR (a mixing transformation) and xor with <hash> */
	v[0] = ctx->hash[0] ^ (u[1] << 16) ^ (u[0] >> 16);
	v[1] = ctx->hash[1] ^ (u[2] << 16) ^ (u[1] >> 16);
	v[2] = ctx->hash[2] ^ (u[3] << 16) ^ (u[2] >> 16);
	v[3] = ctx->hash[3] ^ (u[4] << 16) ^ (u[3] >> 16);
	v[4] = ctx->hash[4] ^ (u[5] << 16) ^ (u[4] >> 16);
	v[5] = ctx->hash[5] ^ (u[6] << 16) ^ (u[5] >> 16);
	v[6] = ctx->hash[6] ^ (u[7] << 16) ^ (u[6] >> 16);
	v[7] =
	    ctx->hash[7] ^ (u[0] & 0xffff0000) ^ (u[0] << 16) ^ (u[1] &
								 0xffff0000)
	    ^ (u[1] << 16) ^ (u[6] << 16) ^ (u[7] & 0xffff0000) ^ (u[7] >> 16);

	/* 61 rounds of LFSR, mixing up hash */
	ctx->hash[0] = (v[0] & 0xffff0000) ^ (v[0] << 16) ^ (v[0] >> 16) ^
	    (v[1] >> 16) ^ (v[1] & 0xffff0000) ^ (v[2] << 16) ^
	    (v[3] >> 16) ^ (v[4] << 16) ^ (v[5] >> 16) ^ v[5] ^
	    (v[6] >> 16) ^ (v[7] << 16) ^ (v[7] >> 16) ^ (v[7] & 0xffff);
	ctx->hash[1] = (v[0] << 16) ^ (v[0] >> 16) ^ (v[0] & 0xffff0000) ^
	    (v[1] & 0xffff) ^ v[2] ^ (v[2] >> 16) ^ (v[3] << 16) ^
	    (v[4] >> 16) ^ (v[5] << 16) ^ (v[6] << 16) ^ v[6] ^
	    (v[7] & 0xffff0000) ^ (v[7] >> 16);
	ctx->hash[2] = (v[0] & 0xffff) ^ (v[0] << 16) ^ (v[1] << 16) ^
	    (v[1] >> 16) ^ (v[1] & 0xffff0000) ^ (v[2] << 16) ^ (v[3] >> 16) ^
	    v[3] ^ (v[4] << 16) ^ (v[5] >> 16) ^ v[6] ^ (v[6] >> 16) ^
	    (v[7] & 0xffff) ^ (v[7] << 16) ^ (v[7] >> 16);
	ctx->hash[3] = (v[0] << 16) ^ (v[0] >> 16) ^ (v[0] & 0xffff0000) ^
	    (v[1] & 0xffff0000) ^ (v[1] >> 16) ^ (v[2] << 16) ^
	    (v[2] >> 16) ^ v[2] ^ (v[3] << 16) ^ (v[4] >> 16) ^ v[4] ^
	    (v[5] << 16) ^ (v[6] << 16) ^ (v[7] & 0xffff) ^ (v[7] >> 16);
	ctx->hash[4] =
	    (v[0] >> 16) ^ (v[1] << 16) ^ v[1] ^ (v[2] >> 16) ^ v[2] ^ (v[3] <<
									16) ^
	    (v[3] >> 16) ^ v[3] ^ (v[4] << 16) ^ (v[5] >> 16) ^ v[5] ^ (v[6] <<
									16) ^
	    (v[6] >> 16) ^ (v[7] << 16);
	ctx->hash[5] =
	    (v[0] << 16) ^ (v[0] & 0xffff0000) ^ (v[1] << 16) ^ (v[1] >> 16) ^
	    (v[1] & 0xffff0000) ^ (v[2] << 16) ^ v[2] ^ (v[3] >> 16) ^ v[3] ^
	    (v[4] << 16) ^ (v[4] >> 16) ^ v[4] ^ (v[5] << 16) ^ (v[6] << 16) ^
	    (v[6] >> 16) ^ v[6] ^ (v[7] << 16) ^ (v[7] >> 16) ^ (v[7] &
								 0xffff0000);
	ctx->hash[6] =
	    v[0] ^ v[2] ^ (v[2] >> 16) ^ v[3] ^ (v[3] << 16) ^ v[4] ^ (v[4] >>
								       16) ^
	    (v[5] << 16) ^ (v[5] >> 16) ^ v[5] ^ (v[6] << 16) ^ (v[6] >> 16) ^
	    v[6] ^ (v[7] << 16) ^ v[7];
	ctx->hash[7] =
	    v[0] ^ (v[0] >> 16) ^ (v[1] << 16) ^ (v[1] >> 16) ^ (v[2] << 16) ^
	    (v[3] >> 16) ^ v[3] ^ (v[4] << 16) ^ v[4] ^ (v[5] >> 16) ^ v[5] ^
	    (v[6] << 16) ^ (v[6] >> 16) ^ (v[7] << 16) ^ v[7];
}

static void
gost_compute_sum_and_hash(struct crypto_gosthash94_ctx *ctx, const u8 *block,
			  const u32 *sbox)
{
	u32 block_le[8];
	unsigned int i, carry;

	/* compute the 256-bit sum */
	for (i = carry = 0; i < 8; i++, block += 4) {
		block_le[i] = get_unaligned_le32(block);
		ctx->sum[i] += carry;
		carry = (ctx->sum[i] < carry);
		ctx->sum[i] += block_le[i];
		carry += (ctx->sum[i] < block_le[i]);
	}

	/* update message hash */
	gost_block_compress(ctx, block_le, sbox);
}

static void
gosthash94_update_int(struct crypto_gosthash94_ctx *ctx,
		      size_t length, const u8 *msg, const u32 *sbox)
{
	unsigned int index = (unsigned int)ctx->length % GOSTHASH94_BLOCK_SIZE;

	ctx->length += length;

	/* fill partial block */
	if (index) {
		unsigned int left = GOSTHASH94_BLOCK_SIZE - index;

		memcpy(ctx->message + index, msg,
		       (length < left ? length : left));
		if (length < left)
			return;

		/* process partial block */
		gost_compute_sum_and_hash(ctx, ctx->message, sbox);
		msg += left;
		length -= left;
	}
	while (length >= GOSTHASH94_BLOCK_SIZE) {
		gost_compute_sum_and_hash(ctx, msg, sbox);
		msg += GOSTHASH94_BLOCK_SIZE;
		length -= GOSTHASH94_BLOCK_SIZE;
	}
	if (length) {
		/* save leftovers */
		memcpy(ctx->message, msg, length);
	}
}

static void
gosthash94_write_digest(struct crypto_gosthash94_ctx *ctx,
			u8 *result, const u32 *sbox)
{
	unsigned int index = ctx->length & 31;
	unsigned int i;
	u32 msg32[8];
	__le32 *digest = (__le32 *) result;

	/* pad the last block with zeroes and hash it */
	if (index > 0) {
		memset(ctx->message + index, 0, GOSTHASH94_BLOCK_SIZE - index);
		gost_compute_sum_and_hash(ctx, ctx->message, sbox);
	}

	/* hash the message length and the sum */
	msg32[0] = ctx->length << 3;
	msg32[1] = ctx->length >> 29;
	memset(msg32 + 2, 0, sizeof(u32) * 6);

	gost_block_compress(ctx, msg32, sbox);
	gost_block_compress(ctx, ctx->sum, sbox);

	/* convert hash state to result bytes */
	for (i = 0; i < GOSTHASH94_DIGEST_SIZE / 4; i++)
		put_unaligned_le32(ctx->hash[i], digest++);

	*ctx = (struct crypto_gosthash94_ctx) {};
}

static int gosthash94_init(struct shash_desc *desc)
{
	struct crypto_gosthash94_ctx *ctx = shash_desc_ctx(desc);

	memset(ctx, 0, sizeof(*ctx));

	return 0;
}

static int gosthash94_update(struct shash_desc *desc, const u8 *data,
		unsigned int len)
{
	struct crypto_gosthash94_ctx *ctx = shash_desc_ctx(desc);

	gosthash94_update_int(ctx, len, data,
			      gost28147_param_CryptoPro_3411.sbox);
	return 0;
}

static int gosthash94_final(struct shash_desc *desc, u8 *result)
{
	struct crypto_gosthash94_ctx *ctx = shash_desc_ctx(desc);

	gosthash94_write_digest(ctx, result,
				gost28147_param_CryptoPro_3411.sbox);

	return 0;
}

static int gosthash94_finup(struct shash_desc *desc, const u8 *data,
			    unsigned int len, u8 *out)
{
	gosthash94_update(desc, data, len);
	return gosthash94_final(desc, out);
}

static struct shash_alg alg = {
	.digestsize = GOSTHASH94_DIGEST_SIZE,
	.init = gosthash94_init,
	.update = gosthash94_update,
	.final = gosthash94_final,
	.finup = gosthash94_finup,
	.descsize = sizeof(struct crypto_gosthash94_ctx),
	.base = {
		.cra_name = "gosthash94",
		.cra_driver_name = "gosthash94-generic",
		.cra_flags = CRYPTO_ALG_TYPE_SHASH,
		.cra_blocksize = GOSTHASH94_BLOCK_SIZE,
		.cra_module = THIS_MODULE,
	}
};

static int __init gosthash94_generic_mod_init(void)
{
	return crypto_register_shash(&alg);
}

static void __exit gosthash94_generic_mod_fini(void)
{
	crypto_unregister_shash(&alg);
}

module_init(gosthash94_generic_mod_init);
module_exit(gosthash94_generic_mod_fini);

MODULE_LICENSE("GPL");
MODULE_DESCRIPTION("GOST R 34.11-94 Secure Hash Algorithm");

MODULE_ALIAS_CRYPTO("gosthash94");
MODULE_ALIAS_CRYPTO("gosthash94-generic");