Skip to content
Snippets Groups Projects
Select Git revision
  • f856099e6d16eb1270f81bedc94369e96d5fd095
  • master default protected
2 results

tmpfiles.pp

Blame
  • salsa20.c 4.25 KiB
    /* salsa20.c
     *
     * The Salsa20 stream cipher.
     */
    
    /* nettle, low-level cryptographics library
     *
     * Copyright (C) 2012 Simon Josefsson
     *  
     * The nettle library is free software; you can redistribute it and/or modify
     * it under the terms of the GNU Lesser General Public License as published by
     * the Free Software Foundation; either version 2.1 of the License, or (at your
     * option) any later version.
     * 
     * The nettle library is distributed in the hope that it will be useful, but
     * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
     * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser General Public
     * License for more details.
     * 
     * You should have received a copy of the GNU Lesser General Public License
     * along with the nettle library; see the file COPYING.LIB.  If not, write to
     * the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
     * MA 02111-1307, USA.
     */
    
    /* Based on:
       salsa20-ref.c version 20051118
       D. J. Bernstein
       Public domain.
    */
    
    #if HAVE_CONFIG_H
    # include "config.h"
    #endif
    
    #include <assert.h>
    #include <string.h>
    
    #include "salsa20.h"
    
    #include "macros.h"
    #include "memxor.h"
    
    #ifdef WORDS_BIGENDIAN
    #define LE_SWAP32(v)				\
      ((ROTL32(8,  v) & 0x00FF00FFUL) |		\
       (ROTL32(24, v) & 0xFF00FF00UL))
    #else
    #define LE_SWAP32(v) (v)
    #endif
    
    #define QROUND(x0, x1, x2, x3) do { \
      x1 ^= ROTL32(7, x0 + x3);	    \
      x2 ^= ROTL32(9, x1 + x0);	    \
      x3 ^= ROTL32(13, x2 + x1);	    \
      x0 ^= ROTL32(18, x3 + x2);	    \
      } while(0)
    
    static void
    salsa20_hash(uint32_t *output, const uint32_t *input)
    {
      uint32_t x[_SALSA20_INPUT_LENGTH];
      int i;
    
      memcpy (x, input, sizeof (x));
    
      for (i = 20;i > 0;i -= 2) {
        QROUND(x[0], x[4], x[8], x[12]);
        QROUND(x[5], x[9], x[13], x[1]);
        QROUND(x[10], x[14], x[2], x[6]);
        QROUND(x[15], x[3], x[7], x[11]);
    
        QROUND(x[0], x[1], x[2], x[3]);
        QROUND(x[5], x[6], x[7], x[4]);
        QROUND(x[10], x[11], x[8], x[9]);
        QROUND(x[15], x[12], x[13], x[14]);
      }
      for (i = 0;i < _SALSA20_INPUT_LENGTH;++i)
        {
          uint32_t t = x[i] + input[i];
          /* NOTE: We return a word array of byte-swapped values, rather
    	 than using a byte array and LE_WRITE_UINT32, to avoid having
    	 to care about unaligned bytes. */
          output[i] = LE_SWAP32 (t);
        }
    }
    
    void
    salsa20_set_key(struct salsa20_ctx *ctx,
    		unsigned length, const uint8_t *key)
    {
      static const uint32_t sigma[4] = {
        /* "expand 32-byte k" */
        0x61707865, 0x3320646e, 0x79622d32, 0x6b206574
      };
      static const uint32_t tau[4] = {
        /* "expand 16-byte k" */
        0x61707865, 0x3120646e, 0x79622d36, 0x6b206574
      };
      const uint32_t *constants;
      
      assert (length == SALSA20_MIN_KEY_SIZE || length == SALSA20_MAX_KEY_SIZE);
    
      ctx->input[1] = LE_READ_UINT32(key + 0);
      ctx->input[2] = LE_READ_UINT32(key + 4);
      ctx->input[3] = LE_READ_UINT32(key + 8);
      ctx->input[4] = LE_READ_UINT32(key + 12);
      if (length == SALSA20_MAX_KEY_SIZE) { /* recommended */
        ctx->input[11] = LE_READ_UINT32(key + 16);
        ctx->input[12] = LE_READ_UINT32(key + 20);
        ctx->input[13] = LE_READ_UINT32(key + 24);
        ctx->input[14] = LE_READ_UINT32(key + 28);
        constants = sigma;
      } else { /* kbits == 128 */
        ctx->input[11] = ctx->input[1];
        ctx->input[12] = ctx->input[2];
        ctx->input[13] = ctx->input[3];
        ctx->input[14] = ctx->input[4];
        constants = tau;
      }
      ctx->input[0]  = constants[0];
      ctx->input[5]  = constants[1];
      ctx->input[10] = constants[2];
      ctx->input[15] = constants[3];
    }
    
    void
    salsa20_set_iv(struct salsa20_ctx *ctx, const uint8_t *iv)
    {
      ctx->input[6] = LE_READ_UINT32(iv + 0);
      ctx->input[7] = LE_READ_UINT32(iv + 4);
      ctx->input[8] = 0;
      ctx->input[9] = 0;
    }
    
    void
    salsa20_crypt(struct salsa20_ctx *ctx,
    	      unsigned length,
    	      uint8_t *c,
    	      const uint8_t *m)
    {
      uint32_t output[_SALSA20_INPUT_LENGTH];
    
      if (!length)
        return;
      
      for (;;)
        {
          salsa20_hash(output,ctx->input);
          ctx->input[9] += (++ctx->input[8] == 0);
    
          /* stopping at 2^70 length per nonce is user's responsibility */
          
          if (length <= SALSA20_BLOCK_SIZE)
    	{
    	  memxor3 (c, m, (uint8_t *) output, length);
    	  return;
    	}
          memxor3 (c, m, (uint8_t *) output, SALSA20_BLOCK_SIZE);
    
          length -= SALSA20_BLOCK_SIZE;
          c += SALSA20_BLOCK_SIZE;
          m += SALSA20_BLOCK_SIZE;
      }
    }