VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Crypto/Sha2Small.c
blob: 08318833d9bcdde4431925b0e8c1ee8124725625 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
 *
 * LibTomCrypt is a library that provides various cryptographic
 * algorithms in a highly modular and flexible manner.
 *
 * The library is free for all purposes without any express
 * guarantee it works.
 *
 * Tom St Denis, tomstdenis@gmail.com, http://libtom.org
 *
 */

/* Adapted for VeraCrypt */

#include <memory.h>
#include "Common/Tcdefs.h"
#include "Common/Endian.h"
#include "Sha2Small.h"

#pragma optimize ("tl", on)

typedef unsigned __int32 uint32;
typedef unsigned __int8 byte;

#include <stdlib.h>
#pragma intrinsic(_lrotr)
#define RORc(x,n) _lrotr(x,n)

/******************************************************************************/

/*
	The K array
 */

static const uint32 K[64] = {
	0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, 0x3956c25bUL,
	0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL, 0xd807aa98UL, 0x12835b01UL,
	0x243185beUL, 0x550c7dc3UL, 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL,
	0xc19bf174UL, 0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL,
	0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL, 0x983e5152UL,
	0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, 0xc6e00bf3UL, 0xd5a79147UL,
	0x06ca6351UL, 0x14292967UL, 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL,
	0x53380d13UL, 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL,
	0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL, 0xd192e819UL,
	0xd6990624UL, 0xf40e3585UL, 0x106aa070UL, 0x19a4c116UL, 0x1e376c08UL,
	0x2748774cUL, 0x34b0bcb5UL, 0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL,
	0x682e6ff3UL, 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,
	0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL
};

/*
	Various logical functions
 */
#define Ch(x,y,z)			(z ^ (x & (y ^ z)))
#define Maj(x,y,z)		(((x | y) & z) | (x & y))
#define S(x, n)			RORc((x),(n))
#define R(x, n)			((x)>>(n))
#define Sigma0(x)			(S(x, 2) ^ S(x, 13) ^ S(x, 22))
#define Sigma1(x)			(S(x, 6) ^ S(x, 11) ^ S(x, 25))
#define Gamma0(x)			(S(x, 7) ^ S(x, 18) ^ R(x, 3))
#define Gamma1(x)			(S(x, 17) ^ S(x, 19) ^ R(x, 10))

#define STORE32H(x, y, i) { \
(y)[i] = (unsigned char)(((x)>>24)); \
(y)[i+1] = (unsigned char)(((x)>>16)); \
(y)[i+2] = (unsigned char)(((x)>>8)); \
(y)[i+3] = (unsigned char)((x)); \
}

#define LOAD32H(x, y, i) { \
x = ((unsigned long)((y)[i])<<24) | \
((unsigned long)((y)[i+1])<<16) | \
((unsigned long)((y)[i+2])<<8)  | \
((unsigned long)((y)[i+3])); \
}

/*
	compress 512-bits
 */
static void sha256_compress(sha256_ctx * ctx, unsigned char *buf)
{

	uint32 S[8], W[64], t0, t1;
	uint32 t, w2, w15;
	int i;

/*
	copy state into S
 */
	for (i = 0; i < 8; i++) {
		S[i] = ctx->state[i];
	}

/*
	copy the state into 512-bits into W[0..15]
 */
	for (i = 0; i < 16; i++) {
		LOAD32H(W[i], buf , (4*i));
	}

/*
	fill W[16..63]
 */
	for (i = 16; i < 64; i++) {
		w2 = W[i - 2];
		w15 = W[i - 15];
		W[i] = Gamma1(w2) + W[i - 7] + Gamma0(w15) + W[i - 16];
	}

/*
	Compress
 */

#define RND(a,b,c,d,e,f,g,h,i)							\
	t0 = h + Sigma1(e) + Ch(e, f, g) + K[i] + W[i];	\
	t1 = Sigma0(a) + Maj(a, b, c);						\
	d += t0;											\
	h  = t0 + t1;

	for (i = 0; i < 64; ++i) {
		RND(S[0],S[1],S[2],S[3],S[4],S[5],S[6],S[7],i);
		t = S[7]; S[7] = S[6]; S[6] = S[5]; S[5] = S[4];
		S[4] = S[3]; S[3] = S[2]; S[2] = S[1]; S[1] = S[0]; S[0] = t;
	}

/*
	feedback
 */
	for (i = 0; i < 8; i++) {
		ctx->state[i] += S[i];
	}

}

/*
	init the sha256 state
 */
VOID_RETURN sha256_begin(sha256_ctx* ctx)
{
	ctx->curlen = 0;
	ctx->state[0] = 0x6A09E667UL;
	ctx->state[1] = 0xBB67AE85UL;
	ctx->state[2] = 0x3C6EF372UL;
	ctx->state[3] = 0xA54FF53AUL;
	ctx->state[4] = 0x510E527FUL;
	ctx->state[5] = 0x9B05688CUL;
	ctx->state[6] = 0x1F83D9ABUL;
	ctx->state[7] = 0x5BE0CD19UL;
	ctx->highLength = 0;
	ctx->lowLength = 0;
}

VOID_RETURN sha256_hash(unsigned char* data, unsigned int len, sha256_ctx* ctx)
{
	uint32 n;
	while (len > 0) {
		if (ctx->curlen == 0 && len >= 64) {
			sha256_compress(ctx, (unsigned char *)data);

			n = ctx->lowLength + 512;
			if (n < ctx->lowLength) {
				ctx->highLength++;
			}
			ctx->lowLength = n;
			data		+= 64;
			len		-= 64;
		} else {
			n = min(len, 64 - ctx->curlen);
			memcpy(ctx->buf + ctx->curlen, data, (size_t)n);
			ctx->curlen	+= (unsigned int) n;
			data			+= (unsigned int) n;
			len			-= (unsigned int) n;

			if (ctx->curlen == 64) {
				sha256_compress (ctx, ctx->buf);

				n = ctx->lowLength + 512;
				if (n < ctx->lowLength) {
					ctx->highLength++;
				}
				ctx->lowLength = n;
				ctx->curlen	= 0;
			}
		}
	}
	return;
}

VOID_RETURN sha256_end(unsigned char* hval, sha256_ctx* ctx)
{
	int i;
	uint32	n;

/*
	increase the length of the message
 */

	n = ctx->lowLength + (ctx->curlen << 3);
	if (n < ctx->lowLength) {
		ctx->highLength++;
	}
	ctx->highLength += (ctx->curlen >> 29);
	ctx->lowLength = n;

/*
	append the '1' bit
 */
	ctx->buf[ctx->curlen++] = (unsigned char)0x80;

/*
	if the length is currently above 56 bytes we append zeros then compress.
	Then we can fall back to padding zeros and length encoding like normal.
 */
	if (ctx->curlen > 56) {
		while (ctx->curlen < 64) {
			ctx->buf[ctx->curlen++] = (unsigned char)0;
		}
		sha256_compress(ctx, ctx->buf);
		ctx->curlen = 0;
	}

/*
	pad upto 56 bytes of zeroes
 */
	while (ctx->curlen < 56) {
		ctx->buf[ctx->curlen++] = (unsigned char)0;
	}

/*
	store length
 */

	STORE32H(ctx->highLength, ctx->buf, 56);
	STORE32H(ctx->lowLength, ctx->buf, 60);

	sha256_compress(ctx, ctx->buf);

/*
	copy output
 */
	for (i = 0; i < 8; i++) {
		STORE32H(ctx->state[i], hval, (4*i));
	}
}

/******************************************************************************/
'#n1280'>1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473