| Index: openssl/engines/ccgost/gosthash.c
|
| ===================================================================
|
| --- openssl/engines/ccgost/gosthash.c (revision 0)
|
| +++ openssl/engines/ccgost/gosthash.c (revision 0)
|
| @@ -0,0 +1,255 @@
|
| +/**********************************************************************
|
| + * gosthash.c *
|
| + * Copyright (c) 2005-2006 Cryptocom LTD *
|
| + * This file is distributed under the same license as OpenSSL *
|
| + * *
|
| + * Implementation of GOST R 34.11-94 hash function *
|
| + * uses on gost89.c and gost89.h Doesn't need OpenSSL *
|
| + **********************************************************************/
|
| +#include <string.h>
|
| +
|
| +#include "gost89.h"
|
| +#include "gosthash.h"
|
| +
|
| +
|
| +/* Use OPENSSL_malloc for memory allocation if compiled with
|
| + * -DOPENSSL_BUILD, and libc malloc otherwise
|
| + */
|
| +#ifndef MYALLOC
|
| +# ifdef OPENSSL_BUILD
|
| +# include <openssl/crypto.h>
|
| +# define MYALLOC(size) OPENSSL_malloc(size)
|
| +# define MYFREE(ptr) OPENSSL_free(ptr)
|
| +# else
|
| +# define MYALLOC(size) malloc(size)
|
| +# define MYFREE(ptr) free(ptr)
|
| +# endif
|
| +#endif
|
| +/* Following functions are various bit meshing routines used in
|
| + * GOST R 34.11-94 algorithms */
|
| +static void swap_bytes (byte *w, byte *k)
|
| + {
|
| + int i,j;
|
| + for (i=0;i<4;i++)
|
| + for (j=0;j<8;j++)
|
| + k[i+4*j]=w[8*i+j];
|
| +
|
| + }
|
| +
|
| +/* was A_A */
|
| +static void circle_xor8 (const byte *w, byte *k)
|
| + {
|
| + byte buf[8];
|
| + int i;
|
| + memcpy(buf,w,8);
|
| + memcpy(k,w+8,24);
|
| + for(i=0;i<8;i++)
|
| + k[i+24]=buf[i]^k[i];
|
| + }
|
| +
|
| +/* was R_R */
|
| +static void transform_3 (byte *data)
|
| + {
|
| + unsigned short int acc;
|
| + acc=(data[0]^data[2]^data[4]^data[6]^data[24]^data[30])|
|
| + ((data[1]^data[3]^data[5]^data[7]^data[25]^data[31])<<8);
|
| + memmove(data,data+2,30);
|
| + data[30]=acc&0xff;
|
| + data[31]=acc>>8;
|
| + }
|
| +
|
| +/* Adds blocks of N bytes modulo 2**(8*n). Returns carry*/
|
| +static int add_blocks(int n,byte *left, const byte *right)
|
| + {
|
| + int i;
|
| + int carry=0;
|
| + int sum;
|
| + for (i=0;i<n;i++)
|
| + {
|
| + sum=(int)left[i]+(int)right[i]+carry;
|
| + left[i]=sum & 0xff;
|
| + carry=sum>>8;
|
| + }
|
| + return carry;
|
| + }
|
| +
|
| +/* Xor two sequences of bytes */
|
| +static void xor_blocks (byte *result,const byte *a,const byte *b,size_t len)
|
| + {
|
| + size_t i;
|
| + for (i=0;i<len;i++) result[i]=a[i]^b[i];
|
| + }
|
| +
|
| +/*
|
| + * Calculate H(i+1) = Hash(Hi,Mi)
|
| + * Where H and M are 32 bytes long
|
| + */
|
| +static int hash_step(gost_ctx *c,byte *H,const byte *M)
|
| + {
|
| + byte U[32],W[32],V[32],S[32],Key[32];
|
| + int i;
|
| + /* Compute first key */
|
| + xor_blocks(W,H,M,32);
|
| + swap_bytes(W,Key);
|
| + /* Encrypt first 8 bytes of H with first key*/
|
| + gost_enc_with_key(c,Key,H,S);
|
| + /* Compute second key*/
|
| + circle_xor8(H,U);
|
| + circle_xor8(M,V);
|
| + circle_xor8(V,V);
|
| + xor_blocks(W,U,V,32);
|
| + swap_bytes(W,Key);
|
| + /* encrypt second 8 bytes of H with second key*/
|
| + gost_enc_with_key(c,Key,H+8,S+8);
|
| + /* compute third key */
|
| + circle_xor8(U,U);
|
| + U[31]=~U[31]; U[29]=~U[29]; U[28]=~U[28]; U[24]=~U[24];
|
| + U[23]=~U[23]; U[20]=~U[20]; U[18]=~U[18]; U[17]=~U[17];
|
| + U[14]=~U[14]; U[12]=~U[12]; U[10]=~U[10]; U[ 8]=~U[ 8];
|
| + U[ 7]=~U[ 7]; U[ 5]=~U[ 5]; U[ 3]=~U[ 3]; U[ 1]=~U[ 1];
|
| + circle_xor8(V,V);
|
| + circle_xor8(V,V);
|
| + xor_blocks(W,U,V,32);
|
| + swap_bytes(W,Key);
|
| + /* encrypt third 8 bytes of H with third key*/
|
| + gost_enc_with_key(c,Key,H+16,S+16);
|
| + /* Compute fourth key */
|
| + circle_xor8(U,U);
|
| + circle_xor8(V,V);
|
| + circle_xor8(V,V);
|
| + xor_blocks(W,U,V,32);
|
| + swap_bytes(W,Key);
|
| + /* Encrypt last 8 bytes with fourth key */
|
| + gost_enc_with_key(c,Key,H+24,S+24);
|
| + for (i=0;i<12;i++)
|
| + transform_3(S);
|
| + xor_blocks(S,S,M,32);
|
| + transform_3(S);
|
| + xor_blocks(S,S,H,32);
|
| + for (i=0;i<61;i++)
|
| + transform_3(S);
|
| + memcpy(H,S,32);
|
| + return 1;
|
| + }
|
| +
|
| +/* Initialize gost_hash ctx - cleans up temporary structures and
|
| + * set up substitution blocks
|
| + */
|
| +int init_gost_hash_ctx(gost_hash_ctx *ctx, const gost_subst_block *subst_block)
|
| + {
|
| + memset(ctx,0,sizeof(gost_hash_ctx));
|
| + ctx->cipher_ctx = (gost_ctx *)MYALLOC(sizeof(gost_ctx));
|
| + if (!ctx->cipher_ctx)
|
| + {
|
| + return 0;
|
| + }
|
| + gost_init(ctx->cipher_ctx,subst_block);
|
| + return 1;
|
| + }
|
| +
|
| +/*
|
| + * Free cipher CTX if it is dynamically allocated. Do not use
|
| + * if cipher ctx is statically allocated as in OpenSSL implementation of
|
| + * GOST hash algroritm
|
| + *
|
| + */
|
| +void done_gost_hash_ctx(gost_hash_ctx *ctx)
|
| + {
|
| + /* No need to use gost_destroy, because cipher keys are not really
|
| + * secret when hashing */
|
| + MYFREE(ctx->cipher_ctx);
|
| + }
|
| +
|
| +/*
|
| + * reset state of hash context to begin hashing new message
|
| + */
|
| +int start_hash(gost_hash_ctx *ctx)
|
| + {
|
| + if (!ctx->cipher_ctx) return 0;
|
| + memset(&(ctx->H),0,32);
|
| + memset(&(ctx->S),0,32);
|
| + ctx->len = 0L;
|
| + ctx->left=0;
|
| + return 1;
|
| + }
|
| +
|
| +/*
|
| + * Hash block of arbitrary length
|
| + *
|
| + *
|
| + */
|
| +int hash_block(gost_hash_ctx *ctx,const byte *block, size_t length)
|
| + {
|
| + const byte *curptr=block;
|
| + const byte *barrier=block+(length-32);/* Last byte we can safely hash*/
|
| + if (ctx->left)
|
| + {
|
| + /*There are some bytes from previous step*/
|
| + unsigned int add_bytes = 32-ctx->left;
|
| + if (add_bytes>length)
|
| + {
|
| + add_bytes = length;
|
| + }
|
| + memcpy(&(ctx->remainder[ctx->left]),block,add_bytes);
|
| + ctx->left+=add_bytes;
|
| + if (ctx->left<32)
|
| + {
|
| + return 1;
|
| + }
|
| + curptr=block+add_bytes;
|
| + hash_step(ctx->cipher_ctx,ctx->H,ctx->remainder);
|
| + add_blocks(32,ctx->S,ctx->remainder);
|
| + ctx->len+=32;
|
| + ctx->left=0;
|
| + }
|
| + while (curptr<=barrier)
|
| + {
|
| + hash_step(ctx->cipher_ctx,ctx->H,curptr);
|
| +
|
| + add_blocks(32,ctx->S,curptr);
|
| + ctx->len+=32;
|
| + curptr+=32;
|
| + }
|
| + if (curptr!=block+length)
|
| + {
|
| + ctx->left=block+length-curptr;
|
| + memcpy(ctx->remainder,curptr,ctx->left);
|
| + }
|
| + return 1;
|
| + }
|
| +
|
| +/*
|
| + * Compute hash value from current state of ctx
|
| + * state of hash ctx becomes invalid and cannot be used for further
|
| + * hashing.
|
| + */
|
| +int finish_hash(gost_hash_ctx *ctx,byte *hashval)
|
| + {
|
| + byte buf[32];
|
| + byte H[32];
|
| + byte S[32];
|
| + ghosthash_len fin_len=ctx->len;
|
| + byte *bptr;
|
| + memcpy(H,ctx->H,32);
|
| + memcpy(S,ctx->S,32);
|
| + if (ctx->left)
|
| + {
|
| + memset(buf,0,32);
|
| + memcpy(buf,ctx->remainder,ctx->left);
|
| + hash_step(ctx->cipher_ctx,H,buf);
|
| + add_blocks(32,S,buf);
|
| + fin_len+=ctx->left;
|
| + }
|
| + memset(buf,0,32);
|
| + bptr=buf;
|
| + fin_len<<=3; /* Hash length in BITS!!*/
|
| + while(fin_len>0)
|
| + {
|
| + *(bptr++)=(byte)(fin_len&0xFF);
|
| + fin_len>>=8;
|
| + };
|
| + hash_step(ctx->cipher_ctx,H,buf);
|
| + hash_step(ctx->cipher_ctx,H,S);
|
| + memcpy(hashval,H,32);
|
| + return 1;
|
| + }
|
|
|