1 /***********************************************************************
3 ** Implementation of the Skein hash function.
5 ** Source code author: Doug Whiting, 2008.
7 ** This algorithm and source code is released to the public domain.
9 ************************************************************************/
11 #define SKEIN_PORT_CODE /* instantiate any code in skein_port.h */
13 #include <linux/string.h> /* get the memcpy/memset functions */
14 #include "skein.h" /* get the Skein API definitions */
15 #include "skein_iv.h" /* get precomputed IVs */
16 #include "skein_block.h"
18 /*****************************************************************/
20 /*****************************************************************/
22 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
23 /* init the context for a straight hashing operation */
24 int skein_256_init(struct skein_256_ctx
*ctx
, size_t hash_bit_len
)
27 u8 b
[SKEIN_256_STATE_BYTES
];
28 u64 w
[SKEIN_256_STATE_WORDS
];
29 } cfg
; /* config block */
31 skein_assert_ret(hash_bit_len
> 0, SKEIN_BAD_HASHLEN
);
32 ctx
->h
.hash_bit_len
= hash_bit_len
; /* output hash bit count */
34 switch (hash_bit_len
) { /* use pre-computed values, where available */
36 memcpy(ctx
->x
, SKEIN_256_IV_256
, sizeof(ctx
->x
));
39 memcpy(ctx
->x
, SKEIN_256_IV_224
, sizeof(ctx
->x
));
42 memcpy(ctx
->x
, SKEIN_256_IV_160
, sizeof(ctx
->x
));
45 memcpy(ctx
->x
, SKEIN_256_IV_128
, sizeof(ctx
->x
));
48 /* here if there is no precomputed IV value available */
50 * build/process the config block, type == CONFIG (could be
53 /* set tweaks: T0=0; T1=CFG | FINAL */
54 skein_start_new_type(ctx
, CFG_FINAL
);
56 /* set the schema, version */
57 cfg
.w
[0] = skein_swap64(SKEIN_SCHEMA_VER
);
58 /* hash result length in bits */
59 cfg
.w
[1] = skein_swap64(hash_bit_len
);
60 cfg
.w
[2] = skein_swap64(SKEIN_CFG_TREE_INFO_SEQUENTIAL
);
61 /* zero pad config block */
62 memset(&cfg
.w
[3], 0, sizeof(cfg
) - 3*sizeof(cfg
.w
[0]));
64 /* compute the initial chaining values from config block */
65 /* zero the chaining variables */
66 memset(ctx
->x
, 0, sizeof(ctx
->x
));
67 skein_256_process_block(ctx
, cfg
.b
, 1, SKEIN_CFG_STR_LEN
);
70 /* The chaining vars ctx->x are now initialized for hash_bit_len. */
71 /* Set up to process the data message portion of the hash (default) */
72 skein_start_new_type(ctx
, MSG
); /* T0=0, T1= MSG type */
77 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
78 /* init the context for a MAC and/or tree hash operation */
79 /* [identical to skein_256_init() when key_bytes == 0 && \
80 * tree_info == SKEIN_CFG_TREE_INFO_SEQUENTIAL] */
81 int skein_256_init_ext(struct skein_256_ctx
*ctx
, size_t hash_bit_len
,
82 u64 tree_info
, const u8
*key
, size_t key_bytes
)
85 u8 b
[SKEIN_256_STATE_BYTES
];
86 u64 w
[SKEIN_256_STATE_WORDS
];
87 } cfg
; /* config block */
89 skein_assert_ret(hash_bit_len
> 0, SKEIN_BAD_HASHLEN
);
90 skein_assert_ret(key_bytes
== 0 || key
!= NULL
, SKEIN_FAIL
);
92 /* compute the initial chaining values ctx->x[], based on key */
93 if (key_bytes
== 0) { /* is there a key? */
94 /* no key: use all zeroes as key for config block */
95 memset(ctx
->x
, 0, sizeof(ctx
->x
));
96 } else { /* here to pre-process a key */
97 skein_assert(sizeof(cfg
.b
) >= sizeof(ctx
->x
));
98 /* do a mini-Init right here */
99 /* set output hash bit count = state size */
100 ctx
->h
.hash_bit_len
= 8*sizeof(ctx
->x
);
101 /* set tweaks: T0 = 0; T1 = KEY type */
102 skein_start_new_type(ctx
, KEY
);
103 /* zero the initial chaining variables */
104 memset(ctx
->x
, 0, sizeof(ctx
->x
));
106 skein_256_update(ctx
, key
, key_bytes
);
107 /* put result into cfg.b[] */
108 skein_256_final_pad(ctx
, cfg
.b
);
109 /* copy over into ctx->x[] */
110 memcpy(ctx
->x
, cfg
.b
, sizeof(cfg
.b
));
113 * build/process the config block, type == CONFIG (could be
114 * precomputed for each key)
116 /* output hash bit count */
117 ctx
->h
.hash_bit_len
= hash_bit_len
;
118 skein_start_new_type(ctx
, CFG_FINAL
);
120 /* pre-pad cfg.w[] with zeroes */
121 memset(&cfg
.w
, 0, sizeof(cfg
.w
));
122 cfg
.w
[0] = skein_swap64(SKEIN_SCHEMA_VER
);
123 /* hash result length in bits */
124 cfg
.w
[1] = skein_swap64(hash_bit_len
);
125 /* tree hash config info (or SKEIN_CFG_TREE_INFO_SEQUENTIAL) */
126 cfg
.w
[2] = skein_swap64(tree_info
);
128 skein_show_key(256, &ctx
->h
, key
, key_bytes
);
130 /* compute the initial chaining values from config block */
131 skein_256_process_block(ctx
, cfg
.b
, 1, SKEIN_CFG_STR_LEN
);
133 /* The chaining vars ctx->x are now initialized */
134 /* Set up to process the data message portion of the hash (default) */
135 skein_start_new_type(ctx
, MSG
);
137 return SKEIN_SUCCESS
;
140 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
141 /* process the input bytes */
142 int skein_256_update(struct skein_256_ctx
*ctx
, const u8
*msg
,
147 /* catch uninitialized context */
148 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_256_BLOCK_BYTES
, SKEIN_FAIL
);
150 /* process full blocks, if any */
151 if (msg_byte_cnt
+ ctx
->h
.b_cnt
> SKEIN_256_BLOCK_BYTES
) {
152 /* finish up any buffered message data */
154 /* # bytes free in buffer b[] */
155 n
= SKEIN_256_BLOCK_BYTES
- ctx
->h
.b_cnt
;
157 /* check on our logic here */
158 skein_assert(n
< msg_byte_cnt
);
159 memcpy(&ctx
->b
[ctx
->h
.b_cnt
], msg
, n
);
164 skein_assert(ctx
->h
.b_cnt
== SKEIN_256_BLOCK_BYTES
);
165 skein_256_process_block(ctx
, ctx
->b
, 1,
166 SKEIN_256_BLOCK_BYTES
);
170 * now process any remaining full blocks, directly from input
173 if (msg_byte_cnt
> SKEIN_256_BLOCK_BYTES
) {
174 /* number of full blocks to process */
175 n
= (msg_byte_cnt
-1) / SKEIN_256_BLOCK_BYTES
;
176 skein_256_process_block(ctx
, msg
, n
,
177 SKEIN_256_BLOCK_BYTES
);
178 msg_byte_cnt
-= n
* SKEIN_256_BLOCK_BYTES
;
179 msg
+= n
* SKEIN_256_BLOCK_BYTES
;
181 skein_assert(ctx
->h
.b_cnt
== 0);
184 /* copy any remaining source message data bytes into b[] */
186 skein_assert(msg_byte_cnt
+ ctx
->h
.b_cnt
<=
187 SKEIN_256_BLOCK_BYTES
);
188 memcpy(&ctx
->b
[ctx
->h
.b_cnt
], msg
, msg_byte_cnt
);
189 ctx
->h
.b_cnt
+= msg_byte_cnt
;
192 return SKEIN_SUCCESS
;
195 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
196 /* finalize the hash computation and output the result */
197 int skein_256_final(struct skein_256_ctx
*ctx
, u8
*hash_val
)
199 size_t i
, n
, byte_cnt
;
200 u64 x
[SKEIN_256_STATE_WORDS
];
201 /* catch uninitialized context */
202 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_256_BLOCK_BYTES
, SKEIN_FAIL
);
204 /* tag as the final block */
205 ctx
->h
.tweak
[1] |= SKEIN_T1_FLAG_FINAL
;
206 /* zero pad b[] if necessary */
207 if (ctx
->h
.b_cnt
< SKEIN_256_BLOCK_BYTES
)
208 memset(&ctx
->b
[ctx
->h
.b_cnt
], 0,
209 SKEIN_256_BLOCK_BYTES
- ctx
->h
.b_cnt
);
211 /* process the final block */
212 skein_256_process_block(ctx
, ctx
->b
, 1, ctx
->h
.b_cnt
);
214 /* now output the result */
215 /* total number of output bytes */
216 byte_cnt
= (ctx
->h
.hash_bit_len
+ 7) >> 3;
218 /* run Threefish in "counter mode" to generate output */
219 /* zero out b[], so it can hold the counter */
220 memset(ctx
->b
, 0, sizeof(ctx
->b
));
221 /* keep a local copy of counter mode "key" */
222 memcpy(x
, ctx
->x
, sizeof(x
));
223 for (i
= 0; i
*SKEIN_256_BLOCK_BYTES
< byte_cnt
; i
++) {
224 /* build the counter block */
225 ((u64
*)ctx
->b
)[0] = skein_swap64((u64
) i
);
226 skein_start_new_type(ctx
, OUT_FINAL
);
227 /* run "counter mode" */
228 skein_256_process_block(ctx
, ctx
->b
, 1, sizeof(u64
));
229 /* number of output bytes left to go */
230 n
= byte_cnt
- i
*SKEIN_256_BLOCK_BYTES
;
231 if (n
>= SKEIN_256_BLOCK_BYTES
)
232 n
= SKEIN_256_BLOCK_BYTES
;
233 /* "output" the ctr mode bytes */
234 skein_put64_lsb_first(hash_val
+i
*SKEIN_256_BLOCK_BYTES
, ctx
->x
,
236 skein_show_final(256, &ctx
->h
, n
,
237 hash_val
+i
*SKEIN_256_BLOCK_BYTES
);
238 /* restore the counter mode key for next time */
239 memcpy(ctx
->x
, x
, sizeof(x
));
241 return SKEIN_SUCCESS
;
244 /*****************************************************************/
246 /*****************************************************************/
248 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
249 /* init the context for a straight hashing operation */
250 int skein_512_init(struct skein_512_ctx
*ctx
, size_t hash_bit_len
)
253 u8 b
[SKEIN_512_STATE_BYTES
];
254 u64 w
[SKEIN_512_STATE_WORDS
];
255 } cfg
; /* config block */
257 skein_assert_ret(hash_bit_len
> 0, SKEIN_BAD_HASHLEN
);
258 ctx
->h
.hash_bit_len
= hash_bit_len
; /* output hash bit count */
260 switch (hash_bit_len
) { /* use pre-computed values, where available */
262 memcpy(ctx
->x
, SKEIN_512_IV_512
, sizeof(ctx
->x
));
265 memcpy(ctx
->x
, SKEIN_512_IV_384
, sizeof(ctx
->x
));
268 memcpy(ctx
->x
, SKEIN_512_IV_256
, sizeof(ctx
->x
));
271 memcpy(ctx
->x
, SKEIN_512_IV_224
, sizeof(ctx
->x
));
274 /* here if there is no precomputed IV value available */
276 * build/process the config block, type == CONFIG (could be
279 /* set tweaks: T0=0; T1=CFG | FINAL */
280 skein_start_new_type(ctx
, CFG_FINAL
);
282 /* set the schema, version */
283 cfg
.w
[0] = skein_swap64(SKEIN_SCHEMA_VER
);
284 /* hash result length in bits */
285 cfg
.w
[1] = skein_swap64(hash_bit_len
);
286 cfg
.w
[2] = skein_swap64(SKEIN_CFG_TREE_INFO_SEQUENTIAL
);
287 /* zero pad config block */
288 memset(&cfg
.w
[3], 0, sizeof(cfg
) - 3*sizeof(cfg
.w
[0]));
290 /* compute the initial chaining values from config block */
291 /* zero the chaining variables */
292 memset(ctx
->x
, 0, sizeof(ctx
->x
));
293 skein_512_process_block(ctx
, cfg
.b
, 1, SKEIN_CFG_STR_LEN
);
298 * The chaining vars ctx->x are now initialized for the given
301 /* Set up to process the data message portion of the hash (default) */
302 skein_start_new_type(ctx
, MSG
); /* T0=0, T1= MSG type */
304 return SKEIN_SUCCESS
;
307 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
308 /* init the context for a MAC and/or tree hash operation */
309 /* [identical to skein_512_init() when key_bytes == 0 && \
310 * tree_info == SKEIN_CFG_TREE_INFO_SEQUENTIAL] */
311 int skein_512_init_ext(struct skein_512_ctx
*ctx
, size_t hash_bit_len
,
312 u64 tree_info
, const u8
*key
, size_t key_bytes
)
315 u8 b
[SKEIN_512_STATE_BYTES
];
316 u64 w
[SKEIN_512_STATE_WORDS
];
317 } cfg
; /* config block */
319 skein_assert_ret(hash_bit_len
> 0, SKEIN_BAD_HASHLEN
);
320 skein_assert_ret(key_bytes
== 0 || key
!= NULL
, SKEIN_FAIL
);
322 /* compute the initial chaining values ctx->x[], based on key */
323 if (key_bytes
== 0) { /* is there a key? */
324 /* no key: use all zeroes as key for config block */
325 memset(ctx
->x
, 0, sizeof(ctx
->x
));
326 } else { /* here to pre-process a key */
327 skein_assert(sizeof(cfg
.b
) >= sizeof(ctx
->x
));
328 /* do a mini-Init right here */
329 /* set output hash bit count = state size */
330 ctx
->h
.hash_bit_len
= 8*sizeof(ctx
->x
);
331 /* set tweaks: T0 = 0; T1 = KEY type */
332 skein_start_new_type(ctx
, KEY
);
333 /* zero the initial chaining variables */
334 memset(ctx
->x
, 0, sizeof(ctx
->x
));
336 skein_512_update(ctx
, key
, key_bytes
);
337 /* put result into cfg.b[] */
338 skein_512_final_pad(ctx
, cfg
.b
);
339 /* copy over into ctx->x[] */
340 memcpy(ctx
->x
, cfg
.b
, sizeof(cfg
.b
));
343 * build/process the config block, type == CONFIG (could be
344 * precomputed for each key)
346 ctx
->h
.hash_bit_len
= hash_bit_len
; /* output hash bit count */
347 skein_start_new_type(ctx
, CFG_FINAL
);
349 /* pre-pad cfg.w[] with zeroes */
350 memset(&cfg
.w
, 0, sizeof(cfg
.w
));
351 cfg
.w
[0] = skein_swap64(SKEIN_SCHEMA_VER
);
352 /* hash result length in bits */
353 cfg
.w
[1] = skein_swap64(hash_bit_len
);
354 /* tree hash config info (or SKEIN_CFG_TREE_INFO_SEQUENTIAL) */
355 cfg
.w
[2] = skein_swap64(tree_info
);
357 skein_show_key(512, &ctx
->h
, key
, key_bytes
);
359 /* compute the initial chaining values from config block */
360 skein_512_process_block(ctx
, cfg
.b
, 1, SKEIN_CFG_STR_LEN
);
362 /* The chaining vars ctx->x are now initialized */
363 /* Set up to process the data message portion of the hash (default) */
364 skein_start_new_type(ctx
, MSG
);
366 return SKEIN_SUCCESS
;
369 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
370 /* process the input bytes */
371 int skein_512_update(struct skein_512_ctx
*ctx
, const u8
*msg
,
376 /* catch uninitialized context */
377 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_512_BLOCK_BYTES
, SKEIN_FAIL
);
379 /* process full blocks, if any */
380 if (msg_byte_cnt
+ ctx
->h
.b_cnt
> SKEIN_512_BLOCK_BYTES
) {
381 /* finish up any buffered message data */
383 /* # bytes free in buffer b[] */
384 n
= SKEIN_512_BLOCK_BYTES
- ctx
->h
.b_cnt
;
386 /* check on our logic here */
387 skein_assert(n
< msg_byte_cnt
);
388 memcpy(&ctx
->b
[ctx
->h
.b_cnt
], msg
, n
);
393 skein_assert(ctx
->h
.b_cnt
== SKEIN_512_BLOCK_BYTES
);
394 skein_512_process_block(ctx
, ctx
->b
, 1,
395 SKEIN_512_BLOCK_BYTES
);
399 * now process any remaining full blocks, directly from input
402 if (msg_byte_cnt
> SKEIN_512_BLOCK_BYTES
) {
403 /* number of full blocks to process */
404 n
= (msg_byte_cnt
-1) / SKEIN_512_BLOCK_BYTES
;
405 skein_512_process_block(ctx
, msg
, n
,
406 SKEIN_512_BLOCK_BYTES
);
407 msg_byte_cnt
-= n
* SKEIN_512_BLOCK_BYTES
;
408 msg
+= n
* SKEIN_512_BLOCK_BYTES
;
410 skein_assert(ctx
->h
.b_cnt
== 0);
413 /* copy any remaining source message data bytes into b[] */
415 skein_assert(msg_byte_cnt
+ ctx
->h
.b_cnt
<=
416 SKEIN_512_BLOCK_BYTES
);
417 memcpy(&ctx
->b
[ctx
->h
.b_cnt
], msg
, msg_byte_cnt
);
418 ctx
->h
.b_cnt
+= msg_byte_cnt
;
421 return SKEIN_SUCCESS
;
424 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
425 /* finalize the hash computation and output the result */
426 int skein_512_final(struct skein_512_ctx
*ctx
, u8
*hash_val
)
428 size_t i
, n
, byte_cnt
;
429 u64 x
[SKEIN_512_STATE_WORDS
];
430 /* catch uninitialized context */
431 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_512_BLOCK_BYTES
, SKEIN_FAIL
);
433 /* tag as the final block */
434 ctx
->h
.tweak
[1] |= SKEIN_T1_FLAG_FINAL
;
435 /* zero pad b[] if necessary */
436 if (ctx
->h
.b_cnt
< SKEIN_512_BLOCK_BYTES
)
437 memset(&ctx
->b
[ctx
->h
.b_cnt
], 0,
438 SKEIN_512_BLOCK_BYTES
- ctx
->h
.b_cnt
);
440 /* process the final block */
441 skein_512_process_block(ctx
, ctx
->b
, 1, ctx
->h
.b_cnt
);
443 /* now output the result */
444 /* total number of output bytes */
445 byte_cnt
= (ctx
->h
.hash_bit_len
+ 7) >> 3;
447 /* run Threefish in "counter mode" to generate output */
448 /* zero out b[], so it can hold the counter */
449 memset(ctx
->b
, 0, sizeof(ctx
->b
));
450 /* keep a local copy of counter mode "key" */
451 memcpy(x
, ctx
->x
, sizeof(x
));
452 for (i
= 0; i
*SKEIN_512_BLOCK_BYTES
< byte_cnt
; i
++) {
453 /* build the counter block */
454 ((u64
*)ctx
->b
)[0] = skein_swap64((u64
) i
);
455 skein_start_new_type(ctx
, OUT_FINAL
);
456 /* run "counter mode" */
457 skein_512_process_block(ctx
, ctx
->b
, 1, sizeof(u64
));
458 /* number of output bytes left to go */
459 n
= byte_cnt
- i
*SKEIN_512_BLOCK_BYTES
;
460 if (n
>= SKEIN_512_BLOCK_BYTES
)
461 n
= SKEIN_512_BLOCK_BYTES
;
462 /* "output" the ctr mode bytes */
463 skein_put64_lsb_first(hash_val
+i
*SKEIN_512_BLOCK_BYTES
, ctx
->x
,
465 skein_show_final(512, &ctx
->h
, n
,
466 hash_val
+i
*SKEIN_512_BLOCK_BYTES
);
467 /* restore the counter mode key for next time */
468 memcpy(ctx
->x
, x
, sizeof(x
));
470 return SKEIN_SUCCESS
;
473 /*****************************************************************/
475 /*****************************************************************/
477 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
478 /* init the context for a straight hashing operation */
479 int skein_1024_init(struct skein_1024_ctx
*ctx
, size_t hash_bit_len
)
482 u8 b
[SKEIN_1024_STATE_BYTES
];
483 u64 w
[SKEIN_1024_STATE_WORDS
];
484 } cfg
; /* config block */
486 skein_assert_ret(hash_bit_len
> 0, SKEIN_BAD_HASHLEN
);
487 ctx
->h
.hash_bit_len
= hash_bit_len
; /* output hash bit count */
489 switch (hash_bit_len
) { /* use pre-computed values, where available */
491 memcpy(ctx
->x
, SKEIN_1024_IV_512
, sizeof(ctx
->x
));
494 memcpy(ctx
->x
, SKEIN_1024_IV_384
, sizeof(ctx
->x
));
497 memcpy(ctx
->x
, SKEIN_1024_IV_1024
, sizeof(ctx
->x
));
500 /* here if there is no precomputed IV value available */
502 * build/process the config block, type == CONFIG
503 * (could be precomputed)
505 /* set tweaks: T0=0; T1=CFG | FINAL */
506 skein_start_new_type(ctx
, CFG_FINAL
);
508 /* set the schema, version */
509 cfg
.w
[0] = skein_swap64(SKEIN_SCHEMA_VER
);
510 /* hash result length in bits */
511 cfg
.w
[1] = skein_swap64(hash_bit_len
);
512 cfg
.w
[2] = skein_swap64(SKEIN_CFG_TREE_INFO_SEQUENTIAL
);
513 /* zero pad config block */
514 memset(&cfg
.w
[3], 0, sizeof(cfg
) - 3*sizeof(cfg
.w
[0]));
516 /* compute the initial chaining values from config block */
517 /* zero the chaining variables */
518 memset(ctx
->x
, 0, sizeof(ctx
->x
));
519 skein_1024_process_block(ctx
, cfg
.b
, 1, SKEIN_CFG_STR_LEN
);
523 /* The chaining vars ctx->x are now initialized for the hash_bit_len. */
524 /* Set up to process the data message portion of the hash (default) */
525 skein_start_new_type(ctx
, MSG
); /* T0=0, T1= MSG type */
527 return SKEIN_SUCCESS
;
530 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
531 /* init the context for a MAC and/or tree hash operation */
532 /* [identical to skein_1024_init() when key_bytes == 0 && \
533 * tree_info == SKEIN_CFG_TREE_INFO_SEQUENTIAL] */
534 int skein_1024_init_ext(struct skein_1024_ctx
*ctx
, size_t hash_bit_len
,
535 u64 tree_info
, const u8
*key
, size_t key_bytes
)
538 u8 b
[SKEIN_1024_STATE_BYTES
];
539 u64 w
[SKEIN_1024_STATE_WORDS
];
540 } cfg
; /* config block */
542 skein_assert_ret(hash_bit_len
> 0, SKEIN_BAD_HASHLEN
);
543 skein_assert_ret(key_bytes
== 0 || key
!= NULL
, SKEIN_FAIL
);
545 /* compute the initial chaining values ctx->x[], based on key */
546 if (key_bytes
== 0) { /* is there a key? */
547 /* no key: use all zeroes as key for config block */
548 memset(ctx
->x
, 0, sizeof(ctx
->x
));
549 } else { /* here to pre-process a key */
550 skein_assert(sizeof(cfg
.b
) >= sizeof(ctx
->x
));
551 /* do a mini-Init right here */
552 /* set output hash bit count = state size */
553 ctx
->h
.hash_bit_len
= 8*sizeof(ctx
->x
);
554 /* set tweaks: T0 = 0; T1 = KEY type */
555 skein_start_new_type(ctx
, KEY
);
556 /* zero the initial chaining variables */
557 memset(ctx
->x
, 0, sizeof(ctx
->x
));
559 skein_1024_update(ctx
, key
, key_bytes
);
560 /* put result into cfg.b[] */
561 skein_1024_final_pad(ctx
, cfg
.b
);
562 /* copy over into ctx->x[] */
563 memcpy(ctx
->x
, cfg
.b
, sizeof(cfg
.b
));
566 * build/process the config block, type == CONFIG (could be
567 * precomputed for each key)
569 /* output hash bit count */
570 ctx
->h
.hash_bit_len
= hash_bit_len
;
571 skein_start_new_type(ctx
, CFG_FINAL
);
573 /* pre-pad cfg.w[] with zeroes */
574 memset(&cfg
.w
, 0, sizeof(cfg
.w
));
575 cfg
.w
[0] = skein_swap64(SKEIN_SCHEMA_VER
);
576 /* hash result length in bits */
577 cfg
.w
[1] = skein_swap64(hash_bit_len
);
578 /* tree hash config info (or SKEIN_CFG_TREE_INFO_SEQUENTIAL) */
579 cfg
.w
[2] = skein_swap64(tree_info
);
581 skein_show_key(1024, &ctx
->h
, key
, key_bytes
);
583 /* compute the initial chaining values from config block */
584 skein_1024_process_block(ctx
, cfg
.b
, 1, SKEIN_CFG_STR_LEN
);
586 /* The chaining vars ctx->x are now initialized */
587 /* Set up to process the data message portion of the hash (default) */
588 skein_start_new_type(ctx
, MSG
);
590 return SKEIN_SUCCESS
;
593 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
594 /* process the input bytes */
595 int skein_1024_update(struct skein_1024_ctx
*ctx
, const u8
*msg
,
600 /* catch uninitialized context */
601 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_1024_BLOCK_BYTES
, SKEIN_FAIL
);
603 /* process full blocks, if any */
604 if (msg_byte_cnt
+ ctx
->h
.b_cnt
> SKEIN_1024_BLOCK_BYTES
) {
605 /* finish up any buffered message data */
607 /* # bytes free in buffer b[] */
608 n
= SKEIN_1024_BLOCK_BYTES
- ctx
->h
.b_cnt
;
610 /* check on our logic here */
611 skein_assert(n
< msg_byte_cnt
);
612 memcpy(&ctx
->b
[ctx
->h
.b_cnt
], msg
, n
);
617 skein_assert(ctx
->h
.b_cnt
== SKEIN_1024_BLOCK_BYTES
);
618 skein_1024_process_block(ctx
, ctx
->b
, 1,
619 SKEIN_1024_BLOCK_BYTES
);
623 * now process any remaining full blocks, directly from input
626 if (msg_byte_cnt
> SKEIN_1024_BLOCK_BYTES
) {
627 /* number of full blocks to process */
628 n
= (msg_byte_cnt
-1) / SKEIN_1024_BLOCK_BYTES
;
629 skein_1024_process_block(ctx
, msg
, n
,
630 SKEIN_1024_BLOCK_BYTES
);
631 msg_byte_cnt
-= n
* SKEIN_1024_BLOCK_BYTES
;
632 msg
+= n
* SKEIN_1024_BLOCK_BYTES
;
634 skein_assert(ctx
->h
.b_cnt
== 0);
637 /* copy any remaining source message data bytes into b[] */
639 skein_assert(msg_byte_cnt
+ ctx
->h
.b_cnt
<=
640 SKEIN_1024_BLOCK_BYTES
);
641 memcpy(&ctx
->b
[ctx
->h
.b_cnt
], msg
, msg_byte_cnt
);
642 ctx
->h
.b_cnt
+= msg_byte_cnt
;
645 return SKEIN_SUCCESS
;
648 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
649 /* finalize the hash computation and output the result */
650 int skein_1024_final(struct skein_1024_ctx
*ctx
, u8
*hash_val
)
652 size_t i
, n
, byte_cnt
;
653 u64 x
[SKEIN_1024_STATE_WORDS
];
654 /* catch uninitialized context */
655 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_1024_BLOCK_BYTES
, SKEIN_FAIL
);
657 /* tag as the final block */
658 ctx
->h
.tweak
[1] |= SKEIN_T1_FLAG_FINAL
;
659 /* zero pad b[] if necessary */
660 if (ctx
->h
.b_cnt
< SKEIN_1024_BLOCK_BYTES
)
661 memset(&ctx
->b
[ctx
->h
.b_cnt
], 0,
662 SKEIN_1024_BLOCK_BYTES
- ctx
->h
.b_cnt
);
664 /* process the final block */
665 skein_1024_process_block(ctx
, ctx
->b
, 1, ctx
->h
.b_cnt
);
667 /* now output the result */
668 /* total number of output bytes */
669 byte_cnt
= (ctx
->h
.hash_bit_len
+ 7) >> 3;
671 /* run Threefish in "counter mode" to generate output */
672 /* zero out b[], so it can hold the counter */
673 memset(ctx
->b
, 0, sizeof(ctx
->b
));
674 /* keep a local copy of counter mode "key" */
675 memcpy(x
, ctx
->x
, sizeof(x
));
676 for (i
= 0; i
*SKEIN_1024_BLOCK_BYTES
< byte_cnt
; i
++) {
677 /* build the counter block */
678 ((u64
*)ctx
->b
)[0] = skein_swap64((u64
) i
);
679 skein_start_new_type(ctx
, OUT_FINAL
);
680 /* run "counter mode" */
681 skein_1024_process_block(ctx
, ctx
->b
, 1, sizeof(u64
));
682 /* number of output bytes left to go */
683 n
= byte_cnt
- i
*SKEIN_1024_BLOCK_BYTES
;
684 if (n
>= SKEIN_1024_BLOCK_BYTES
)
685 n
= SKEIN_1024_BLOCK_BYTES
;
686 /* "output" the ctr mode bytes */
687 skein_put64_lsb_first(hash_val
+i
*SKEIN_1024_BLOCK_BYTES
, ctx
->x
,
689 skein_show_final(1024, &ctx
->h
, n
,
690 hash_val
+i
*SKEIN_1024_BLOCK_BYTES
);
691 /* restore the counter mode key for next time */
692 memcpy(ctx
->x
, x
, sizeof(x
));
694 return SKEIN_SUCCESS
;
697 /**************** Functions to support MAC/tree hashing ***************/
698 /* (this code is identical for Optimized and Reference versions) */
700 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
701 /* finalize the hash computation and output the block, no OUTPUT stage */
702 int skein_256_final_pad(struct skein_256_ctx
*ctx
, u8
*hash_val
)
704 /* catch uninitialized context */
705 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_256_BLOCK_BYTES
, SKEIN_FAIL
);
707 /* tag as the final block */
708 ctx
->h
.tweak
[1] |= SKEIN_T1_FLAG_FINAL
;
709 /* zero pad b[] if necessary */
710 if (ctx
->h
.b_cnt
< SKEIN_256_BLOCK_BYTES
)
711 memset(&ctx
->b
[ctx
->h
.b_cnt
], 0,
712 SKEIN_256_BLOCK_BYTES
- ctx
->h
.b_cnt
);
713 /* process the final block */
714 skein_256_process_block(ctx
, ctx
->b
, 1, ctx
->h
.b_cnt
);
716 /* "output" the state bytes */
717 skein_put64_lsb_first(hash_val
, ctx
->x
, SKEIN_256_BLOCK_BYTES
);
719 return SKEIN_SUCCESS
;
722 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
723 /* finalize the hash computation and output the block, no OUTPUT stage */
724 int skein_512_final_pad(struct skein_512_ctx
*ctx
, u8
*hash_val
)
726 /* catch uninitialized context */
727 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_512_BLOCK_BYTES
, SKEIN_FAIL
);
729 /* tag as the final block */
730 ctx
->h
.tweak
[1] |= SKEIN_T1_FLAG_FINAL
;
731 /* zero pad b[] if necessary */
732 if (ctx
->h
.b_cnt
< SKEIN_512_BLOCK_BYTES
)
733 memset(&ctx
->b
[ctx
->h
.b_cnt
], 0,
734 SKEIN_512_BLOCK_BYTES
- ctx
->h
.b_cnt
);
735 /* process the final block */
736 skein_512_process_block(ctx
, ctx
->b
, 1, ctx
->h
.b_cnt
);
738 /* "output" the state bytes */
739 skein_put64_lsb_first(hash_val
, ctx
->x
, SKEIN_512_BLOCK_BYTES
);
741 return SKEIN_SUCCESS
;
744 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
745 /* finalize the hash computation and output the block, no OUTPUT stage */
746 int skein_1024_final_pad(struct skein_1024_ctx
*ctx
, u8
*hash_val
)
748 /* catch uninitialized context */
749 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_1024_BLOCK_BYTES
, SKEIN_FAIL
);
751 /* tag as the final block */
752 ctx
->h
.tweak
[1] |= SKEIN_T1_FLAG_FINAL
;
753 /* zero pad b[] if necessary */
754 if (ctx
->h
.b_cnt
< SKEIN_1024_BLOCK_BYTES
)
755 memset(&ctx
->b
[ctx
->h
.b_cnt
], 0,
756 SKEIN_1024_BLOCK_BYTES
- ctx
->h
.b_cnt
);
757 /* process the final block */
758 skein_1024_process_block(ctx
, ctx
->b
, 1, ctx
->h
.b_cnt
);
760 /* "output" the state bytes */
761 skein_put64_lsb_first(hash_val
, ctx
->x
, SKEIN_1024_BLOCK_BYTES
);
763 return SKEIN_SUCCESS
;
767 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
768 /* just do the OUTPUT stage */
769 int skein_256_output(struct skein_256_ctx
*ctx
, u8
*hash_val
)
771 size_t i
, n
, byte_cnt
;
772 u64 x
[SKEIN_256_STATE_WORDS
];
773 /* catch uninitialized context */
774 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_256_BLOCK_BYTES
, SKEIN_FAIL
);
776 /* now output the result */
777 /* total number of output bytes */
778 byte_cnt
= (ctx
->h
.hash_bit_len
+ 7) >> 3;
780 /* run Threefish in "counter mode" to generate output */
781 /* zero out b[], so it can hold the counter */
782 memset(ctx
->b
, 0, sizeof(ctx
->b
));
783 /* keep a local copy of counter mode "key" */
784 memcpy(x
, ctx
->x
, sizeof(x
));
785 for (i
= 0; i
*SKEIN_256_BLOCK_BYTES
< byte_cnt
; i
++) {
786 /* build the counter block */
787 ((u64
*)ctx
->b
)[0] = skein_swap64((u64
) i
);
788 skein_start_new_type(ctx
, OUT_FINAL
);
789 /* run "counter mode" */
790 skein_256_process_block(ctx
, ctx
->b
, 1, sizeof(u64
));
791 /* number of output bytes left to go */
792 n
= byte_cnt
- i
*SKEIN_256_BLOCK_BYTES
;
793 if (n
>= SKEIN_256_BLOCK_BYTES
)
794 n
= SKEIN_256_BLOCK_BYTES
;
795 /* "output" the ctr mode bytes */
796 skein_put64_lsb_first(hash_val
+i
*SKEIN_256_BLOCK_BYTES
, ctx
->x
,
798 skein_show_final(256, &ctx
->h
, n
,
799 hash_val
+i
*SKEIN_256_BLOCK_BYTES
);
800 /* restore the counter mode key for next time */
801 memcpy(ctx
->x
, x
, sizeof(x
));
803 return SKEIN_SUCCESS
;
806 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
807 /* just do the OUTPUT stage */
808 int skein_512_output(struct skein_512_ctx
*ctx
, u8
*hash_val
)
810 size_t i
, n
, byte_cnt
;
811 u64 x
[SKEIN_512_STATE_WORDS
];
812 /* catch uninitialized context */
813 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_512_BLOCK_BYTES
, SKEIN_FAIL
);
815 /* now output the result */
816 /* total number of output bytes */
817 byte_cnt
= (ctx
->h
.hash_bit_len
+ 7) >> 3;
819 /* run Threefish in "counter mode" to generate output */
820 /* zero out b[], so it can hold the counter */
821 memset(ctx
->b
, 0, sizeof(ctx
->b
));
822 /* keep a local copy of counter mode "key" */
823 memcpy(x
, ctx
->x
, sizeof(x
));
824 for (i
= 0; i
*SKEIN_512_BLOCK_BYTES
< byte_cnt
; i
++) {
825 /* build the counter block */
826 ((u64
*)ctx
->b
)[0] = skein_swap64((u64
) i
);
827 skein_start_new_type(ctx
, OUT_FINAL
);
828 /* run "counter mode" */
829 skein_512_process_block(ctx
, ctx
->b
, 1, sizeof(u64
));
830 /* number of output bytes left to go */
831 n
= byte_cnt
- i
*SKEIN_512_BLOCK_BYTES
;
832 if (n
>= SKEIN_512_BLOCK_BYTES
)
833 n
= SKEIN_512_BLOCK_BYTES
;
834 /* "output" the ctr mode bytes */
835 skein_put64_lsb_first(hash_val
+i
*SKEIN_512_BLOCK_BYTES
, ctx
->x
,
837 skein_show_final(256, &ctx
->h
, n
,
838 hash_val
+i
*SKEIN_512_BLOCK_BYTES
);
839 /* restore the counter mode key for next time */
840 memcpy(ctx
->x
, x
, sizeof(x
));
842 return SKEIN_SUCCESS
;
845 /*++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++*/
846 /* just do the OUTPUT stage */
847 int skein_1024_output(struct skein_1024_ctx
*ctx
, u8
*hash_val
)
849 size_t i
, n
, byte_cnt
;
850 u64 x
[SKEIN_1024_STATE_WORDS
];
851 /* catch uninitialized context */
852 skein_assert_ret(ctx
->h
.b_cnt
<= SKEIN_1024_BLOCK_BYTES
, SKEIN_FAIL
);
854 /* now output the result */
855 /* total number of output bytes */
856 byte_cnt
= (ctx
->h
.hash_bit_len
+ 7) >> 3;
858 /* run Threefish in "counter mode" to generate output */
859 /* zero out b[], so it can hold the counter */
860 memset(ctx
->b
, 0, sizeof(ctx
->b
));
861 /* keep a local copy of counter mode "key" */
862 memcpy(x
, ctx
->x
, sizeof(x
));
863 for (i
= 0; i
*SKEIN_1024_BLOCK_BYTES
< byte_cnt
; i
++) {
864 /* build the counter block */
865 ((u64
*)ctx
->b
)[0] = skein_swap64((u64
) i
);
866 skein_start_new_type(ctx
, OUT_FINAL
);
867 /* run "counter mode" */
868 skein_1024_process_block(ctx
, ctx
->b
, 1, sizeof(u64
));
869 /* number of output bytes left to go */
870 n
= byte_cnt
- i
*SKEIN_1024_BLOCK_BYTES
;
871 if (n
>= SKEIN_1024_BLOCK_BYTES
)
872 n
= SKEIN_1024_BLOCK_BYTES
;
873 /* "output" the ctr mode bytes */
874 skein_put64_lsb_first(hash_val
+i
*SKEIN_1024_BLOCK_BYTES
, ctx
->x
,
876 skein_show_final(256, &ctx
->h
, n
,
877 hash_val
+i
*SKEIN_1024_BLOCK_BYTES
);
878 /* restore the counter mode key for next time */
879 memcpy(ctx
->x
, x
, sizeof(x
));
881 return SKEIN_SUCCESS
;