/src/botan/src/lib/hash/sha2_64/sha2_64.cpp
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * SHA-{384,512} |
3 | | * (C) 1999-2011,2015 Jack Lloyd |
4 | | * |
5 | | * Botan is released under the Simplified BSD License (see license.txt) |
6 | | */ |
7 | | |
8 | | #include <botan/internal/sha2_64.h> |
9 | | #include <botan/internal/loadstor.h> |
10 | | #include <botan/internal/rotate.h> |
11 | | #include <botan/internal/bit_ops.h> |
12 | | #include <botan/internal/cpuid.h> |
13 | | |
14 | | namespace Botan { |
15 | | |
16 | | namespace { |
17 | | |
18 | | std::string sha512_provider() |
19 | 0 | { |
20 | 0 | #if defined(BOTAN_HAS_SHA2_64_BMI2) |
21 | 0 | if(CPUID::has_bmi2()) |
22 | 0 | { |
23 | 0 | return "bmi2"; |
24 | 0 | } |
25 | 0 | #endif |
26 | | |
27 | 0 | return "base"; |
28 | 0 | } |
29 | | |
30 | | } |
31 | | |
32 | | std::unique_ptr<HashFunction> SHA_384::copy_state() const |
33 | 0 | { |
34 | 0 | return std::make_unique<SHA_384>(*this); |
35 | 0 | } |
36 | | |
37 | | std::unique_ptr<HashFunction> SHA_512::copy_state() const |
38 | 0 | { |
39 | 0 | return std::make_unique<SHA_512>(*this); |
40 | 0 | } |
41 | | |
42 | | std::unique_ptr<HashFunction> SHA_512_256::copy_state() const |
43 | 0 | { |
44 | 0 | return std::make_unique<SHA_512_256>(*this); |
45 | 0 | } |
46 | | |
47 | | /* |
48 | | * SHA-512 F1 Function |
49 | | * |
50 | | * Use a macro as many compilers won't inline a function this big, |
51 | | * even though it is much faster if inlined. |
52 | | */ |
53 | | #define SHA2_64_F(A, B, C, D, E, F, G, H, M1, M2, M3, M4, magic) \ |
54 | 0 | do { \ |
55 | 0 | const uint64_t E_rho = rotr<14>(E) ^ rotr<18>(E) ^ rotr<41>(E); \ |
56 | 0 | const uint64_t A_rho = rotr<28>(A) ^ rotr<34>(A) ^ rotr<39>(A); \ |
57 | 0 | const uint64_t M2_sigma = rotr<19>(M2) ^ rotr<61>(M2) ^ (M2 >> 6); \ |
58 | 0 | const uint64_t M4_sigma = rotr<1>(M4) ^ rotr<8>(M4) ^ (M4 >> 7); \ |
59 | 0 | H += magic + E_rho + choose(E, F, G) + M1; \ |
60 | 0 | D += H; \ |
61 | 0 | H += A_rho + majority(A, B, C); \ |
62 | 0 | M1 += M2_sigma + M3 + M4_sigma; \ |
63 | 0 | } while(0); |
64 | | |
65 | | /* |
66 | | * SHA-{384,512} Compression Function |
67 | | */ |
68 | | //static |
69 | | void SHA_512::compress_digest(secure_vector<uint64_t>& digest, |
70 | | const uint8_t input[], size_t blocks) |
71 | 109k | { |
72 | 109k | #if defined(BOTAN_HAS_SHA2_64_BMI2) |
73 | 109k | if(CPUID::has_bmi2()) |
74 | 109k | { |
75 | 109k | return compress_digest_bmi2(digest, input, blocks); |
76 | 109k | } |
77 | 0 | #endif |
78 | | |
79 | 0 | uint64_t A = digest[0], B = digest[1], C = digest[2], |
80 | 0 | D = digest[3], E = digest[4], F = digest[5], |
81 | 0 | G = digest[6], H = digest[7]; |
82 | |
|
83 | 0 | for(size_t i = 0; i != blocks; ++i) |
84 | 0 | { |
85 | 0 | uint64_t W00 = load_be<uint64_t>(input, 0); |
86 | 0 | uint64_t W01 = load_be<uint64_t>(input, 1); |
87 | 0 | uint64_t W02 = load_be<uint64_t>(input, 2); |
88 | 0 | uint64_t W03 = load_be<uint64_t>(input, 3); |
89 | 0 | uint64_t W04 = load_be<uint64_t>(input, 4); |
90 | 0 | uint64_t W05 = load_be<uint64_t>(input, 5); |
91 | 0 | uint64_t W06 = load_be<uint64_t>(input, 6); |
92 | 0 | uint64_t W07 = load_be<uint64_t>(input, 7); |
93 | 0 | uint64_t W08 = load_be<uint64_t>(input, 8); |
94 | 0 | uint64_t W09 = load_be<uint64_t>(input, 9); |
95 | 0 | uint64_t W10 = load_be<uint64_t>(input, 10); |
96 | 0 | uint64_t W11 = load_be<uint64_t>(input, 11); |
97 | 0 | uint64_t W12 = load_be<uint64_t>(input, 12); |
98 | 0 | uint64_t W13 = load_be<uint64_t>(input, 13); |
99 | 0 | uint64_t W14 = load_be<uint64_t>(input, 14); |
100 | 0 | uint64_t W15 = load_be<uint64_t>(input, 15); |
101 | |
|
102 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W00, W14, W09, W01, 0x428A2F98D728AE22); |
103 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W01, W15, W10, W02, 0x7137449123EF65CD); |
104 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W02, W00, W11, W03, 0xB5C0FBCFEC4D3B2F); |
105 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W03, W01, W12, W04, 0xE9B5DBA58189DBBC); |
106 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W04, W02, W13, W05, 0x3956C25BF348B538); |
107 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W05, W03, W14, W06, 0x59F111F1B605D019); |
108 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W06, W04, W15, W07, 0x923F82A4AF194F9B); |
109 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W07, W05, W00, W08, 0xAB1C5ED5DA6D8118); |
110 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W08, W06, W01, W09, 0xD807AA98A3030242); |
111 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W09, W07, W02, W10, 0x12835B0145706FBE); |
112 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W10, W08, W03, W11, 0x243185BE4EE4B28C); |
113 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W11, W09, W04, W12, 0x550C7DC3D5FFB4E2); |
114 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W12, W10, W05, W13, 0x72BE5D74F27B896F); |
115 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W13, W11, W06, W14, 0x80DEB1FE3B1696B1); |
116 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W14, W12, W07, W15, 0x9BDC06A725C71235); |
117 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W15, W13, W08, W00, 0xC19BF174CF692694); |
118 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W00, W14, W09, W01, 0xE49B69C19EF14AD2); |
119 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W01, W15, W10, W02, 0xEFBE4786384F25E3); |
120 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W02, W00, W11, W03, 0x0FC19DC68B8CD5B5); |
121 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W03, W01, W12, W04, 0x240CA1CC77AC9C65); |
122 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W04, W02, W13, W05, 0x2DE92C6F592B0275); |
123 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W05, W03, W14, W06, 0x4A7484AA6EA6E483); |
124 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W06, W04, W15, W07, 0x5CB0A9DCBD41FBD4); |
125 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W07, W05, W00, W08, 0x76F988DA831153B5); |
126 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W08, W06, W01, W09, 0x983E5152EE66DFAB); |
127 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W09, W07, W02, W10, 0xA831C66D2DB43210); |
128 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W10, W08, W03, W11, 0xB00327C898FB213F); |
129 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W11, W09, W04, W12, 0xBF597FC7BEEF0EE4); |
130 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W12, W10, W05, W13, 0xC6E00BF33DA88FC2); |
131 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W13, W11, W06, W14, 0xD5A79147930AA725); |
132 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W14, W12, W07, W15, 0x06CA6351E003826F); |
133 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W15, W13, W08, W00, 0x142929670A0E6E70); |
134 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W00, W14, W09, W01, 0x27B70A8546D22FFC); |
135 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W01, W15, W10, W02, 0x2E1B21385C26C926); |
136 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W02, W00, W11, W03, 0x4D2C6DFC5AC42AED); |
137 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W03, W01, W12, W04, 0x53380D139D95B3DF); |
138 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W04, W02, W13, W05, 0x650A73548BAF63DE); |
139 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W05, W03, W14, W06, 0x766A0ABB3C77B2A8); |
140 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W06, W04, W15, W07, 0x81C2C92E47EDAEE6); |
141 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W07, W05, W00, W08, 0x92722C851482353B); |
142 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W08, W06, W01, W09, 0xA2BFE8A14CF10364); |
143 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W09, W07, W02, W10, 0xA81A664BBC423001); |
144 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W10, W08, W03, W11, 0xC24B8B70D0F89791); |
145 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W11, W09, W04, W12, 0xC76C51A30654BE30); |
146 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W12, W10, W05, W13, 0xD192E819D6EF5218); |
147 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W13, W11, W06, W14, 0xD69906245565A910); |
148 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W14, W12, W07, W15, 0xF40E35855771202A); |
149 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W15, W13, W08, W00, 0x106AA07032BBD1B8); |
150 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W00, W14, W09, W01, 0x19A4C116B8D2D0C8); |
151 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W01, W15, W10, W02, 0x1E376C085141AB53); |
152 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W02, W00, W11, W03, 0x2748774CDF8EEB99); |
153 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W03, W01, W12, W04, 0x34B0BCB5E19B48A8); |
154 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W04, W02, W13, W05, 0x391C0CB3C5C95A63); |
155 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W05, W03, W14, W06, 0x4ED8AA4AE3418ACB); |
156 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W06, W04, W15, W07, 0x5B9CCA4F7763E373); |
157 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W07, W05, W00, W08, 0x682E6FF3D6B2B8A3); |
158 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W08, W06, W01, W09, 0x748F82EE5DEFB2FC); |
159 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W09, W07, W02, W10, 0x78A5636F43172F60); |
160 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W10, W08, W03, W11, 0x84C87814A1F0AB72); |
161 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W11, W09, W04, W12, 0x8CC702081A6439EC); |
162 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W12, W10, W05, W13, 0x90BEFFFA23631E28); |
163 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W13, W11, W06, W14, 0xA4506CEBDE82BDE9); |
164 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W14, W12, W07, W15, 0xBEF9A3F7B2C67915); |
165 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W15, W13, W08, W00, 0xC67178F2E372532B); |
166 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W00, W14, W09, W01, 0xCA273ECEEA26619C); |
167 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W01, W15, W10, W02, 0xD186B8C721C0C207); |
168 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W02, W00, W11, W03, 0xEADA7DD6CDE0EB1E); |
169 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W03, W01, W12, W04, 0xF57D4F7FEE6ED178); |
170 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W04, W02, W13, W05, 0x06F067AA72176FBA); |
171 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W05, W03, W14, W06, 0x0A637DC5A2C898A6); |
172 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W06, W04, W15, W07, 0x113F9804BEF90DAE); |
173 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W07, W05, W00, W08, 0x1B710B35131C471B); |
174 | 0 | SHA2_64_F(A, B, C, D, E, F, G, H, W08, W06, W01, W09, 0x28DB77F523047D84); |
175 | 0 | SHA2_64_F(H, A, B, C, D, E, F, G, W09, W07, W02, W10, 0x32CAAB7B40C72493); |
176 | 0 | SHA2_64_F(G, H, A, B, C, D, E, F, W10, W08, W03, W11, 0x3C9EBE0A15C9BEBC); |
177 | 0 | SHA2_64_F(F, G, H, A, B, C, D, E, W11, W09, W04, W12, 0x431D67C49C100D4C); |
178 | 0 | SHA2_64_F(E, F, G, H, A, B, C, D, W12, W10, W05, W13, 0x4CC5D4BECB3E42B6); |
179 | 0 | SHA2_64_F(D, E, F, G, H, A, B, C, W13, W11, W06, W14, 0x597F299CFC657E2A); |
180 | 0 | SHA2_64_F(C, D, E, F, G, H, A, B, W14, W12, W07, W15, 0x5FCB6FAB3AD6FAEC); |
181 | 0 | SHA2_64_F(B, C, D, E, F, G, H, A, W15, W13, W08, W00, 0x6C44198C4A475817); |
182 | |
|
183 | 0 | A = (digest[0] += A); |
184 | 0 | B = (digest[1] += B); |
185 | 0 | C = (digest[2] += C); |
186 | 0 | D = (digest[3] += D); |
187 | 0 | E = (digest[4] += E); |
188 | 0 | F = (digest[5] += F); |
189 | 0 | G = (digest[6] += G); |
190 | 0 | H = (digest[7] += H); |
191 | |
|
192 | 0 | input += 128; |
193 | 0 | } |
194 | 0 | } |
195 | | |
196 | | #undef SHA2_64_F |
197 | | |
198 | | std::string SHA_512_256::provider() const |
199 | 0 | { |
200 | 0 | return sha512_provider(); |
201 | 0 | } |
202 | | |
203 | | std::string SHA_384::provider() const |
204 | 0 | { |
205 | 0 | return sha512_provider(); |
206 | 0 | } |
207 | | |
208 | | std::string SHA_512::provider() const |
209 | 0 | { |
210 | 0 | return sha512_provider(); |
211 | 0 | } |
212 | | |
213 | | void SHA_512_256::compress_n(const uint8_t input[], size_t blocks) |
214 | 2.24k | { |
215 | 2.24k | SHA_512::compress_digest(m_digest, input, blocks); |
216 | 2.24k | } |
217 | | |
218 | | void SHA_384::compress_n(const uint8_t input[], size_t blocks) |
219 | 106k | { |
220 | 106k | SHA_512::compress_digest(m_digest, input, blocks); |
221 | 106k | } |
222 | | |
223 | | void SHA_512::compress_n(const uint8_t input[], size_t blocks) |
224 | 72 | { |
225 | 72 | SHA_512::compress_digest(m_digest, input, blocks); |
226 | 72 | } |
227 | | |
228 | | void SHA_512_256::copy_out(uint8_t output[]) |
229 | 1.00k | { |
230 | 1.00k | copy_out_vec_be(output, output_length(), m_digest); |
231 | 1.00k | } |
232 | | |
233 | | void SHA_384::copy_out(uint8_t output[]) |
234 | 45.3k | { |
235 | 45.3k | copy_out_vec_be(output, output_length(), m_digest); |
236 | 45.3k | } |
237 | | |
238 | | void SHA_512::copy_out(uint8_t output[]) |
239 | 16 | { |
240 | 16 | copy_out_vec_be(output, output_length(), m_digest); |
241 | 16 | } |
242 | | |
243 | | void SHA_512_256::clear() |
244 | 1.53k | { |
245 | 1.53k | MDx_HashFunction::clear(); |
246 | 1.53k | m_digest[0] = 0x22312194FC2BF72C; |
247 | 1.53k | m_digest[1] = 0x9F555FA3C84C64C2; |
248 | 1.53k | m_digest[2] = 0x2393B86B6F53B151; |
249 | 1.53k | m_digest[3] = 0x963877195940EABD; |
250 | 1.53k | m_digest[4] = 0x96283EE2A88EFFE3; |
251 | 1.53k | m_digest[5] = 0xBE5E1E2553863992; |
252 | 1.53k | m_digest[6] = 0x2B0199FC2C85B8AA; |
253 | 1.53k | m_digest[7] = 0x0EB72DDC81C52CA2; |
254 | 1.53k | } |
255 | | |
256 | | void SHA_384::clear() |
257 | 54.0k | { |
258 | 54.0k | MDx_HashFunction::clear(); |
259 | 54.0k | m_digest[0] = 0xCBBB9D5DC1059ED8; |
260 | 54.0k | m_digest[1] = 0x629A292A367CD507; |
261 | 54.0k | m_digest[2] = 0x9159015A3070DD17; |
262 | 54.0k | m_digest[3] = 0x152FECD8F70E5939; |
263 | 54.0k | m_digest[4] = 0x67332667FFC00B31; |
264 | 54.0k | m_digest[5] = 0x8EB44A8768581511; |
265 | 54.0k | m_digest[6] = 0xDB0C2E0D64F98FA7; |
266 | 54.0k | m_digest[7] = 0x47B5481DBEFA4FA4; |
267 | 54.0k | } |
268 | | |
269 | | void SHA_512::clear() |
270 | 73 | { |
271 | 73 | MDx_HashFunction::clear(); |
272 | 73 | m_digest[0] = 0x6A09E667F3BCC908; |
273 | 73 | m_digest[1] = 0xBB67AE8584CAA73B; |
274 | 73 | m_digest[2] = 0x3C6EF372FE94F82B; |
275 | 73 | m_digest[3] = 0xA54FF53A5F1D36F1; |
276 | 73 | m_digest[4] = 0x510E527FADE682D1; |
277 | 73 | m_digest[5] = 0x9B05688C2B3E6C1F; |
278 | 73 | m_digest[6] = 0x1F83D9ABFB41BD6B; |
279 | 73 | m_digest[7] = 0x5BE0CD19137E2179; |
280 | 73 | } |
281 | | |
282 | | } |