/rust/registry/src/index.crates.io-6f17d22bba15001f/sha2-0.10.8/src/sha256/soft.rs
Line | Count | Source (jump to first uncovered line) |
1 | | #![allow(clippy::many_single_char_names)] |
2 | | use crate::consts::BLOCK_LEN; |
3 | | use core::convert::TryInto; |
4 | | |
5 | | #[inline(always)] |
6 | 0 | fn shl(v: [u32; 4], o: u32) -> [u32; 4] { |
7 | 0 | [v[0] >> o, v[1] >> o, v[2] >> o, v[3] >> o] |
8 | 0 | } |
9 | | |
10 | | #[inline(always)] |
11 | 0 | fn shr(v: [u32; 4], o: u32) -> [u32; 4] { |
12 | 0 | [v[0] << o, v[1] << o, v[2] << o, v[3] << o] |
13 | 0 | } |
14 | | |
15 | | #[inline(always)] |
16 | 0 | fn or(a: [u32; 4], b: [u32; 4]) -> [u32; 4] { |
17 | 0 | [a[0] | b[0], a[1] | b[1], a[2] | b[2], a[3] | b[3]] |
18 | 0 | } |
19 | | |
20 | | #[inline(always)] |
21 | 0 | fn xor(a: [u32; 4], b: [u32; 4]) -> [u32; 4] { |
22 | 0 | [a[0] ^ b[0], a[1] ^ b[1], a[2] ^ b[2], a[3] ^ b[3]] |
23 | 0 | } |
24 | | |
25 | | #[inline(always)] |
26 | 0 | fn add(a: [u32; 4], b: [u32; 4]) -> [u32; 4] { |
27 | 0 | [ |
28 | 0 | a[0].wrapping_add(b[0]), |
29 | 0 | a[1].wrapping_add(b[1]), |
30 | 0 | a[2].wrapping_add(b[2]), |
31 | 0 | a[3].wrapping_add(b[3]), |
32 | 0 | ] |
33 | 0 | } |
34 | | |
35 | 0 | fn sha256load(v2: [u32; 4], v3: [u32; 4]) -> [u32; 4] { |
36 | 0 | [v3[3], v2[0], v2[1], v2[2]] |
37 | 0 | } |
38 | | |
39 | 0 | fn sha256swap(v0: [u32; 4]) -> [u32; 4] { |
40 | 0 | [v0[2], v0[3], v0[0], v0[1]] |
41 | 0 | } |
42 | | |
43 | 0 | fn sha256msg1(v0: [u32; 4], v1: [u32; 4]) -> [u32; 4] { |
44 | | // sigma 0 on vectors |
45 | | #[inline] |
46 | 0 | fn sigma0x4(x: [u32; 4]) -> [u32; 4] { |
47 | 0 | let t1 = or(shl(x, 7), shr(x, 25)); |
48 | 0 | let t2 = or(shl(x, 18), shr(x, 14)); |
49 | 0 | let t3 = shl(x, 3); |
50 | 0 | xor(xor(t1, t2), t3) |
51 | 0 | } |
52 | | |
53 | 0 | add(v0, sigma0x4(sha256load(v0, v1))) |
54 | 0 | } |
55 | | |
56 | 0 | fn sha256msg2(v4: [u32; 4], v3: [u32; 4]) -> [u32; 4] { |
57 | | macro_rules! sigma1 { |
58 | | ($a:expr) => { |
59 | | $a.rotate_right(17) ^ $a.rotate_right(19) ^ ($a >> 10) |
60 | | }; |
61 | | } |
62 | | |
63 | 0 | let [x3, x2, x1, x0] = v4; |
64 | 0 | let [w15, w14, _, _] = v3; |
65 | 0 |
|
66 | 0 | let w16 = x0.wrapping_add(sigma1!(w14)); |
67 | 0 | let w17 = x1.wrapping_add(sigma1!(w15)); |
68 | 0 | let w18 = x2.wrapping_add(sigma1!(w16)); |
69 | 0 | let w19 = x3.wrapping_add(sigma1!(w17)); |
70 | 0 |
|
71 | 0 | [w19, w18, w17, w16] |
72 | 0 | } |
73 | | |
74 | 0 | fn sha256_digest_round_x2(cdgh: [u32; 4], abef: [u32; 4], wk: [u32; 4]) -> [u32; 4] { |
75 | | macro_rules! big_sigma0 { |
76 | | ($a:expr) => { |
77 | | ($a.rotate_right(2) ^ $a.rotate_right(13) ^ $a.rotate_right(22)) |
78 | | }; |
79 | | } |
80 | | macro_rules! big_sigma1 { |
81 | | ($a:expr) => { |
82 | | ($a.rotate_right(6) ^ $a.rotate_right(11) ^ $a.rotate_right(25)) |
83 | | }; |
84 | | } |
85 | | macro_rules! bool3ary_202 { |
86 | | ($a:expr, $b:expr, $c:expr) => { |
87 | | $c ^ ($a & ($b ^ $c)) |
88 | | }; |
89 | | } // Choose, MD5F, SHA1C |
90 | | macro_rules! bool3ary_232 { |
91 | | ($a:expr, $b:expr, $c:expr) => { |
92 | | ($a & $b) ^ ($a & $c) ^ ($b & $c) |
93 | | }; |
94 | | } // Majority, SHA1M |
95 | | |
96 | 0 | let [_, _, wk1, wk0] = wk; |
97 | 0 | let [a0, b0, e0, f0] = abef; |
98 | 0 | let [c0, d0, g0, h0] = cdgh; |
99 | 0 |
|
100 | 0 | // a round |
101 | 0 | let x0 = big_sigma1!(e0) |
102 | 0 | .wrapping_add(bool3ary_202!(e0, f0, g0)) |
103 | 0 | .wrapping_add(wk0) |
104 | 0 | .wrapping_add(h0); |
105 | 0 | let y0 = big_sigma0!(a0).wrapping_add(bool3ary_232!(a0, b0, c0)); |
106 | 0 | let (a1, b1, c1, d1, e1, f1, g1, h1) = ( |
107 | 0 | x0.wrapping_add(y0), |
108 | 0 | a0, |
109 | 0 | b0, |
110 | 0 | c0, |
111 | 0 | x0.wrapping_add(d0), |
112 | 0 | e0, |
113 | 0 | f0, |
114 | 0 | g0, |
115 | 0 | ); |
116 | 0 |
|
117 | 0 | // a round |
118 | 0 | let x1 = big_sigma1!(e1) |
119 | 0 | .wrapping_add(bool3ary_202!(e1, f1, g1)) |
120 | 0 | .wrapping_add(wk1) |
121 | 0 | .wrapping_add(h1); |
122 | 0 | let y1 = big_sigma0!(a1).wrapping_add(bool3ary_232!(a1, b1, c1)); |
123 | 0 | let (a2, b2, _, _, e2, f2, _, _) = ( |
124 | 0 | x1.wrapping_add(y1), |
125 | 0 | a1, |
126 | 0 | b1, |
127 | 0 | c1, |
128 | 0 | x1.wrapping_add(d1), |
129 | 0 | e1, |
130 | 0 | f1, |
131 | 0 | g1, |
132 | 0 | ); |
133 | 0 |
|
134 | 0 | [a2, b2, e2, f2] |
135 | 0 | } |
136 | | |
137 | 0 | fn schedule(v0: [u32; 4], v1: [u32; 4], v2: [u32; 4], v3: [u32; 4]) -> [u32; 4] { |
138 | 0 | let t1 = sha256msg1(v0, v1); |
139 | 0 | let t2 = sha256load(v2, v3); |
140 | 0 | let t3 = add(t1, t2); |
141 | 0 | sha256msg2(t3, v3) |
142 | 0 | } |
143 | | |
144 | | macro_rules! rounds4 { |
145 | | ($abef:ident, $cdgh:ident, $rest:expr, $i:expr) => {{ |
146 | | let t1 = add($rest, crate::consts::K32X4[$i]); |
147 | | $cdgh = sha256_digest_round_x2($cdgh, $abef, t1); |
148 | | let t2 = sha256swap(t1); |
149 | | $abef = sha256_digest_round_x2($abef, $cdgh, t2); |
150 | | }}; |
151 | | } |
152 | | |
153 | | macro_rules! schedule_rounds4 { |
154 | | ( |
155 | | $abef:ident, $cdgh:ident, |
156 | | $w0:expr, $w1:expr, $w2:expr, $w3:expr, $w4:expr, |
157 | | $i: expr |
158 | | ) => {{ |
159 | | $w4 = schedule($w0, $w1, $w2, $w3); |
160 | | rounds4!($abef, $cdgh, $w4, $i); |
161 | | }}; |
162 | | } |
163 | | |
164 | | /// Process a block with the SHA-256 algorithm. |
165 | 0 | fn sha256_digest_block_u32(state: &mut [u32; 8], block: &[u32; 16]) { |
166 | 0 | let mut abef = [state[0], state[1], state[4], state[5]]; |
167 | 0 | let mut cdgh = [state[2], state[3], state[6], state[7]]; |
168 | 0 |
|
169 | 0 | // Rounds 0..64 |
170 | 0 | let mut w0 = [block[3], block[2], block[1], block[0]]; |
171 | 0 | let mut w1 = [block[7], block[6], block[5], block[4]]; |
172 | 0 | let mut w2 = [block[11], block[10], block[9], block[8]]; |
173 | 0 | let mut w3 = [block[15], block[14], block[13], block[12]]; |
174 | 0 | let mut w4; |
175 | 0 |
|
176 | 0 | rounds4!(abef, cdgh, w0, 0); |
177 | 0 | rounds4!(abef, cdgh, w1, 1); |
178 | 0 | rounds4!(abef, cdgh, w2, 2); |
179 | 0 | rounds4!(abef, cdgh, w3, 3); |
180 | 0 | schedule_rounds4!(abef, cdgh, w0, w1, w2, w3, w4, 4); |
181 | 0 | schedule_rounds4!(abef, cdgh, w1, w2, w3, w4, w0, 5); |
182 | 0 | schedule_rounds4!(abef, cdgh, w2, w3, w4, w0, w1, 6); |
183 | 0 | schedule_rounds4!(abef, cdgh, w3, w4, w0, w1, w2, 7); |
184 | 0 | schedule_rounds4!(abef, cdgh, w4, w0, w1, w2, w3, 8); |
185 | 0 | schedule_rounds4!(abef, cdgh, w0, w1, w2, w3, w4, 9); |
186 | 0 | schedule_rounds4!(abef, cdgh, w1, w2, w3, w4, w0, 10); |
187 | 0 | schedule_rounds4!(abef, cdgh, w2, w3, w4, w0, w1, 11); |
188 | 0 | schedule_rounds4!(abef, cdgh, w3, w4, w0, w1, w2, 12); |
189 | 0 | schedule_rounds4!(abef, cdgh, w4, w0, w1, w2, w3, 13); |
190 | 0 | schedule_rounds4!(abef, cdgh, w0, w1, w2, w3, w4, 14); |
191 | 0 | schedule_rounds4!(abef, cdgh, w1, w2, w3, w4, w0, 15); |
192 | 0 |
|
193 | 0 | let [a, b, e, f] = abef; |
194 | 0 | let [c, d, g, h] = cdgh; |
195 | 0 |
|
196 | 0 | state[0] = state[0].wrapping_add(a); |
197 | 0 | state[1] = state[1].wrapping_add(b); |
198 | 0 | state[2] = state[2].wrapping_add(c); |
199 | 0 | state[3] = state[3].wrapping_add(d); |
200 | 0 | state[4] = state[4].wrapping_add(e); |
201 | 0 | state[5] = state[5].wrapping_add(f); |
202 | 0 | state[6] = state[6].wrapping_add(g); |
203 | 0 | state[7] = state[7].wrapping_add(h); |
204 | 0 | } |
205 | | |
206 | 0 | pub fn compress(state: &mut [u32; 8], blocks: &[[u8; 64]]) { |
207 | 0 | let mut block_u32 = [0u32; BLOCK_LEN]; |
208 | 0 | // since LLVM can't properly use aliasing yet it will make |
209 | 0 | // unnecessary state stores without this copy |
210 | 0 | let mut state_cpy = *state; |
211 | 0 | for block in blocks { |
212 | 0 | for (o, chunk) in block_u32.iter_mut().zip(block.chunks_exact(4)) { |
213 | 0 | *o = u32::from_be_bytes(chunk.try_into().unwrap()); |
214 | 0 | } |
215 | 0 | sha256_digest_block_u32(&mut state_cpy, &block_u32); |
216 | | } |
217 | 0 | *state = state_cpy; |
218 | 0 | } |