Coverage Report

Created: 2025-11-17 06:38

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssh/openbsd-compat/chacha_private.h
Line
Count
Source
1
/* OPENBSD ORIGINAL: lib/libc/crypt/chacha_private.h */
2
3
/*
4
chacha-merged.c version 20080118
5
D. J. Bernstein
6
Public domain.
7
*/
8
9
/* $OpenBSD: chacha_private.h,v 1.3 2022/02/28 21:56:29 dtucker Exp $ */
10
11
typedef unsigned char u8;
12
typedef unsigned int u32;
13
14
typedef struct
15
{
16
  u32 input[16]; /* could be compressed */
17
} chacha_ctx;
18
19
6.57M
#define U8C(v) (v##U)
20
67.5M
#define U32C(v) (v##U)
21
22
6.57M
#define U8V(v) ((u8)(v) & U8C(0xFF))
23
67.5M
#define U32V(v) ((u32)(v) & U32C(0xFFFFFFFF))
24
25
#define ROTL32(v, n) \
26
32.8M
  (U32V((v) << (n)) | ((v) >> (32 - (n))))
27
28
#define U8TO32_LITTLE(p) \
29
89.9k
  (((u32)((p)[0])      ) | \
30
89.9k
   ((u32)((p)[1]) <<  8) | \
31
89.9k
   ((u32)((p)[2]) << 16) | \
32
89.9k
   ((u32)((p)[3]) << 24))
33
34
#define U32TO8_LITTLE(p, v) \
35
1.64M
  do { \
36
1.64M
    (p)[0] = U8V((v)      ); \
37
1.64M
    (p)[1] = U8V((v) >>  8); \
38
1.64M
    (p)[2] = U8V((v) >> 16); \
39
1.64M
    (p)[3] = U8V((v) >> 24); \
40
1.64M
  } while (0)
41
42
32.8M
#define ROTATE(v,c) (ROTL32(v,c))
43
#define XOR(v,w) ((v) ^ (w))
44
34.6M
#define PLUS(v,w) (U32V((v) + (w)))
45
102k
#define PLUSONE(v) (PLUS((v),1))
46
47
#define QUARTERROUND(a,b,c,d) \
48
8.22M
  a = PLUS(a,b); d = ROTATE(XOR(d,a),16); \
49
8.22M
  c = PLUS(c,d); b = ROTATE(XOR(b,c),12); \
50
8.22M
  a = PLUS(a,b); d = ROTATE(XOR(d,a), 8); \
51
8.22M
  c = PLUS(c,d); b = ROTATE(XOR(b,c), 7);
52
53
static const char sigma[16] = "expand 32-byte k";
54
static const char tau[16] = "expand 16-byte k";
55
56
static void
57
chacha_keysetup(chacha_ctx *x,const u8 *k,u32 kbits)
58
6.42k
{
59
6.42k
  const char *constants;
60
61
6.42k
  x->input[4] = U8TO32_LITTLE(k + 0);
62
6.42k
  x->input[5] = U8TO32_LITTLE(k + 4);
63
6.42k
  x->input[6] = U8TO32_LITTLE(k + 8);
64
6.42k
  x->input[7] = U8TO32_LITTLE(k + 12);
65
6.42k
  if (kbits == 256) { /* recommended */
66
6.42k
    k += 16;
67
6.42k
    constants = sigma;
68
6.42k
  } else { /* kbits == 128 */
69
0
    constants = tau;
70
0
  }
71
6.42k
  x->input[8] = U8TO32_LITTLE(k + 0);
72
6.42k
  x->input[9] = U8TO32_LITTLE(k + 4);
73
6.42k
  x->input[10] = U8TO32_LITTLE(k + 8);
74
6.42k
  x->input[11] = U8TO32_LITTLE(k + 12);
75
6.42k
  x->input[0] = U8TO32_LITTLE(constants + 0);
76
6.42k
  x->input[1] = U8TO32_LITTLE(constants + 4);
77
6.42k
  x->input[2] = U8TO32_LITTLE(constants + 8);
78
6.42k
  x->input[3] = U8TO32_LITTLE(constants + 12);
79
6.42k
}
80
81
static void
82
chacha_ivsetup(chacha_ctx *x,const u8 *iv)
83
6.42k
{
84
6.42k
  x->input[12] = 0;
85
6.42k
  x->input[13] = 0;
86
6.42k
  x->input[14] = U8TO32_LITTLE(iv + 0);
87
6.42k
  x->input[15] = U8TO32_LITTLE(iv + 4);
88
6.42k
}
89
90
static void
91
chacha_encrypt_bytes(chacha_ctx *x,const u8 *m,u8 *c,u32 bytes)
92
6.42k
{
93
6.42k
  u32 x0, x1, x2, x3, x4, x5, x6, x7, x8, x9, x10, x11, x12, x13, x14, x15;
94
6.42k
  u32 j0, j1, j2, j3, j4, j5, j6, j7, j8, j9, j10, j11, j12, j13, j14, j15;
95
6.42k
  u8 *ctarget = NULL;
96
6.42k
  u8 tmp[64];
97
6.42k
  u_int i;
98
99
6.42k
  if (!bytes) return;
100
101
6.42k
  j0 = x->input[0];
102
6.42k
  j1 = x->input[1];
103
6.42k
  j2 = x->input[2];
104
6.42k
  j3 = x->input[3];
105
6.42k
  j4 = x->input[4];
106
6.42k
  j5 = x->input[5];
107
6.42k
  j6 = x->input[6];
108
6.42k
  j7 = x->input[7];
109
6.42k
  j8 = x->input[8];
110
6.42k
  j9 = x->input[9];
111
6.42k
  j10 = x->input[10];
112
6.42k
  j11 = x->input[11];
113
6.42k
  j12 = x->input[12];
114
6.42k
  j13 = x->input[13];
115
6.42k
  j14 = x->input[14];
116
6.42k
  j15 = x->input[15];
117
118
102k
  for (;;) {
119
102k
    if (bytes < 64) {
120
25
      for (i = 0;i < bytes;++i) tmp[i] = m[i];
121
5
      m = tmp;
122
5
      ctarget = c;
123
5
      c = tmp;
124
5
    }
125
102k
    x0 = j0;
126
102k
    x1 = j1;
127
102k
    x2 = j2;
128
102k
    x3 = j3;
129
102k
    x4 = j4;
130
102k
    x5 = j5;
131
102k
    x6 = j6;
132
102k
    x7 = j7;
133
102k
    x8 = j8;
134
102k
    x9 = j9;
135
102k
    x10 = j10;
136
102k
    x11 = j11;
137
102k
    x12 = j12;
138
102k
    x13 = j13;
139
102k
    x14 = j14;
140
102k
    x15 = j15;
141
1.13M
    for (i = 20;i > 0;i -= 2) {
142
1.02M
      QUARTERROUND( x0, x4, x8,x12)
143
1.02M
      QUARTERROUND( x1, x5, x9,x13)
144
1.02M
      QUARTERROUND( x2, x6,x10,x14)
145
1.02M
      QUARTERROUND( x3, x7,x11,x15)
146
1.02M
      QUARTERROUND( x0, x5,x10,x15)
147
1.02M
      QUARTERROUND( x1, x6,x11,x12)
148
1.02M
      QUARTERROUND( x2, x7, x8,x13)
149
1.02M
      QUARTERROUND( x3, x4, x9,x14)
150
1.02M
    }
151
102k
    x0 = PLUS(x0,j0);
152
102k
    x1 = PLUS(x1,j1);
153
102k
    x2 = PLUS(x2,j2);
154
102k
    x3 = PLUS(x3,j3);
155
102k
    x4 = PLUS(x4,j4);
156
102k
    x5 = PLUS(x5,j5);
157
102k
    x6 = PLUS(x6,j6);
158
102k
    x7 = PLUS(x7,j7);
159
102k
    x8 = PLUS(x8,j8);
160
102k
    x9 = PLUS(x9,j9);
161
102k
    x10 = PLUS(x10,j10);
162
102k
    x11 = PLUS(x11,j11);
163
102k
    x12 = PLUS(x12,j12);
164
102k
    x13 = PLUS(x13,j13);
165
102k
    x14 = PLUS(x14,j14);
166
102k
    x15 = PLUS(x15,j15);
167
168
#ifndef KEYSTREAM_ONLY
169
    x0 = XOR(x0,U8TO32_LITTLE(m + 0));
170
    x1 = XOR(x1,U8TO32_LITTLE(m + 4));
171
    x2 = XOR(x2,U8TO32_LITTLE(m + 8));
172
    x3 = XOR(x3,U8TO32_LITTLE(m + 12));
173
    x4 = XOR(x4,U8TO32_LITTLE(m + 16));
174
    x5 = XOR(x5,U8TO32_LITTLE(m + 20));
175
    x6 = XOR(x6,U8TO32_LITTLE(m + 24));
176
    x7 = XOR(x7,U8TO32_LITTLE(m + 28));
177
    x8 = XOR(x8,U8TO32_LITTLE(m + 32));
178
    x9 = XOR(x9,U8TO32_LITTLE(m + 36));
179
    x10 = XOR(x10,U8TO32_LITTLE(m + 40));
180
    x11 = XOR(x11,U8TO32_LITTLE(m + 44));
181
    x12 = XOR(x12,U8TO32_LITTLE(m + 48));
182
    x13 = XOR(x13,U8TO32_LITTLE(m + 52));
183
    x14 = XOR(x14,U8TO32_LITTLE(m + 56));
184
    x15 = XOR(x15,U8TO32_LITTLE(m + 60));
185
#endif
186
187
102k
    j12 = PLUSONE(j12);
188
102k
    if (!j12) {
189
0
      j13 = PLUSONE(j13);
190
      /* stopping at 2^70 bytes per nonce is user's responsibility */
191
0
    }
192
193
102k
    U32TO8_LITTLE(c + 0,x0);
194
102k
    U32TO8_LITTLE(c + 4,x1);
195
102k
    U32TO8_LITTLE(c + 8,x2);
196
102k
    U32TO8_LITTLE(c + 12,x3);
197
102k
    U32TO8_LITTLE(c + 16,x4);
198
102k
    U32TO8_LITTLE(c + 20,x5);
199
102k
    U32TO8_LITTLE(c + 24,x6);
200
102k
    U32TO8_LITTLE(c + 28,x7);
201
102k
    U32TO8_LITTLE(c + 32,x8);
202
102k
    U32TO8_LITTLE(c + 36,x9);
203
102k
    U32TO8_LITTLE(c + 40,x10);
204
102k
    U32TO8_LITTLE(c + 44,x11);
205
102k
    U32TO8_LITTLE(c + 48,x12);
206
102k
    U32TO8_LITTLE(c + 52,x13);
207
102k
    U32TO8_LITTLE(c + 56,x14);
208
102k
    U32TO8_LITTLE(c + 60,x15);
209
210
102k
    if (bytes <= 64) {
211
6.42k
      if (bytes < 64) {
212
25
        for (i = 0;i < bytes;++i) ctarget[i] = c[i];
213
5
      }
214
6.42k
      x->input[12] = j12;
215
6.42k
      x->input[13] = j13;
216
6.42k
      return;
217
6.42k
    }
218
96.3k
    bytes -= 64;
219
96.3k
    c += 64;
220
#ifndef KEYSTREAM_ONLY
221
    m += 64;
222
#endif
223
96.3k
  }
224
6.42k
}