xref: /xnu-10002.1.13/osfmk/corecrypto/ccsha256_ltc_compress.c (revision 1031c584a5e37aff177559b9f69dbd3c8c3fd30a)
1 /* Copyright (c) (2010,2011,2015-2019,2021) Apple Inc. All rights reserved.
2  *
3  * corecrypto is licensed under Apple Inc.’s Internal Use License Agreement (which
4  * is contained in the License.txt file distributed with corecrypto) and only to
5  * people who accept that license. IMPORTANT:  Any license rights granted to you by
6  * Apple Inc. (if any) are limited to internal use within your organization only on
7  * devices and computers you own or control, for the sole purpose of verifying the
8  * security characteristics and correct functioning of the Apple Software.  You may
9  * not, directly or indirectly, redistribute the Apple Software or any portions thereof.
10  *
11  * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
12  *
13  * This file contains Original Code and/or Modifications of Original Code
14  * as defined in and that are subject to the Apple Public Source License
15  * Version 2.0 (the 'License'). You may not use this file except in
16  * compliance with the License. The rights granted to you under the License
17  * may not be used to create, or enable the creation or redistribution of,
18  * unlawful or unlicensed copies of an Apple operating system, or to
19  * circumvent, violate, or enable the circumvention or violation of, any
20  * terms of an Apple operating system software license agreement.
21  *
22  * Please obtain a copy of the License at
23  * http://www.opensource.apple.com/apsl/ and read it before using this file.
24  *
25  * The Original Code and all software distributed under the License are
26  * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
27  * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
28  * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
29  * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
30  * Please see the License for the specific language governing rights and
31  * limitations under the License.
32  *
33  * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
34  */
35 
36 /*
37  * Parts of this code adapted from LibTomCrypt
38  *
39  * LibTomCrypt, modular cryptographic library -- Tom St Denis
40  *
41  * LibTomCrypt is a library that provides various cryptographic
42  * algorithms in a highly modular and flexible manner.
43  *
44  * The library is free for all purposes without any express
45  * guarantee it works.
46  *
47  * Tom St Denis, [email protected], http://libtom.org
48  */
49 
50 #include <corecrypto/ccsha2.h>
51 #include <corecrypto/cc_priv.h>
52 #include "ccsha2_internal.h"
53 
54 #if !CC_KERNEL || !CC_USE_ASM
55 
56 #if CCSHA2_SHA256_USE_SHA512_K
57 #define K(i) ((uint32_t)(ccsha512_K[i] >> 32))
58 #else
59 #define K(i) ccsha256_K[i]
60 #endif
61 
62 // Various logical functions
63 #define Ch(x, y, z) (z ^ (x & (y ^ z)))
64 #define Maj(x, y, z) (((x | y) & z) | (x & y))
65 #define S(x, n) CC_RORc(x, n)
66 #define R(x, n) ((x) >> (n))
67 #define Sigma0(x) (S(x, 2) ^ S(x, 13) ^ S(x, 22))
68 #define Sigma1(x) (S(x, 6) ^ S(x, 11) ^ S(x, 25))
69 #define Gamma0(x) (S(x, 7) ^ S(x, 18) ^ R(x, 3))
70 #define Gamma1(x) (S(x, 17) ^ S(x, 19) ^ R(x, 10))
71 
72 #define set_W(i) (W[i] = cc_load32_be(buf + (4 * (i))))
73 
74 // the round function
75 #define RND(a, b, c, d, e, f, g, h, i)              \
76     t0 = h + Sigma1(e) + Ch(e, f, g) + K(i) + W[i]; \
77     t1 = Sigma0(a) + Maj(a, b, c);                  \
78     d += t0;                                        \
79     h = t0 + t1;
80 
81 // compress 512-bits
82 void
ccsha256_ltc_compress(ccdigest_state_t state,size_t nblocks,const void * in)83 ccsha256_ltc_compress(ccdigest_state_t state, size_t nblocks, const void *in)
84 {
85 	uint32_t W[64], t0, t1;
86 	uint32_t S[8];
87 	int i;
88 	uint32_t *s = ccdigest_u32(state);
89 	const unsigned char *buf = in;
90 
91 	while (nblocks--) {
92 		// schedule W 0..15
93 		for (i = 0; i < 16; i += 1) {
94 			set_W(i);
95 		}
96 
97 		// schedule W 16..63
98 		for (; i < 64; i++) {
99 			W[i] = Gamma1(W[i - 2]) + W[i - 7] + Gamma0(W[i - 15]) + W[i - 16];
100 		}
101 
102 		// copy state into S
103 		S[0] = s[0];
104 		S[1] = s[1];
105 		S[2] = s[2];
106 		S[3] = s[3];
107 		S[4] = s[4];
108 		S[5] = s[5];
109 		S[6] = s[6];
110 		S[7] = s[7];
111 
112 		// Compress
113 #if CC_SMALL_CODE
114 		for (i = 0; i < 64; i += 1) {
115 			t0 = S[7] + Sigma1(S[4]) + Ch(S[4], S[5], S[6]) + K(i) + W[i];
116 			t1 = Sigma0(S[0]) + Maj(S[0], S[1], S[2]);
117 			S[7] = S[6];
118 			S[6] = S[5];
119 			S[5] = S[4];
120 			S[4] = S[3] + t0;
121 			S[3] = S[2];
122 			S[2] = S[1];
123 			S[1] = S[0];
124 			S[0] = t0 + t1;
125 		}
126 #else
127 		for (i = 0; i < 64; i += 8) {
128 			RND(S[0], S[1], S[2], S[3], S[4], S[5], S[6], S[7], i + 0);
129 			RND(S[7], S[0], S[1], S[2], S[3], S[4], S[5], S[6], i + 1);
130 			RND(S[6], S[7], S[0], S[1], S[2], S[3], S[4], S[5], i + 2);
131 			RND(S[5], S[6], S[7], S[0], S[1], S[2], S[3], S[4], i + 3);
132 			RND(S[4], S[5], S[6], S[7], S[0], S[1], S[2], S[3], i + 4);
133 			RND(S[3], S[4], S[5], S[6], S[7], S[0], S[1], S[2], i + 5);
134 			RND(S[2], S[3], S[4], S[5], S[6], S[7], S[0], S[1], i + 6);
135 			RND(S[1], S[2], S[3], S[4], S[5], S[6], S[7], S[0], i + 7);
136 		}
137 #endif
138 
139 		// feedback
140 		s[0] += S[0];
141 		s[1] += S[1];
142 		s[2] += S[2];
143 		s[3] += S[3];
144 		s[4] += S[4];
145 		s[5] += S[5];
146 		s[6] += S[6];
147 		s[7] += S[7];
148 
149 		buf += CCSHA256_BLOCK_SIZE / sizeof(buf[0]);
150 	}
151 }
152 
153 #endif
154