1 | /* |
2 | Copyright (c) 2016-2017 Contributors as noted in the AUTHORS file |
3 | |
4 | This file is part of libzmq, the ZeroMQ core engine in C++. |
5 | |
6 | libzmq is free software; you can redistribute it and/or modify it under |
7 | the terms of the GNU Lesser General Public License (LGPL) as published |
8 | by the Free Software Foundation; either version 3 of the License, or |
9 | (at your option) any later version. |
10 | |
11 | As a special exception, the Contributors give you permission to link |
12 | this library with independent modules to produce an executable, |
13 | regardless of the license terms of these independent modules, and to |
14 | copy and distribute the resulting executable under terms of your choice, |
15 | provided that you also meet, for each linked independent module, the |
16 | terms and conditions of the license of that module. An independent |
17 | module is a module which is not derived from or based on this library. |
18 | If you modify this library, you must extend this exception to your |
19 | version of the library. |
20 | |
21 | libzmq is distributed in the hope that it will be useful, but WITHOUT |
22 | ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
23 | FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public |
24 | License for more details. |
25 | |
26 | You should have received a copy of the GNU Lesser General Public License |
27 | along with this program. If not, see <http://www.gnu.org/licenses/>. |
28 | */ |
29 | |
30 | /* |
31 | The precompiled header is not used for c files so this is required here. |
32 | */ |
33 | #include "platform.hpp" |
34 | |
35 | #if defined(ZMQ_USE_TWEETNACL) |
36 | |
37 | /* |
38 | Disable warnings for this source only, rather than for the whole |
39 | codebase when building with C99 (gcc >= 4.2) or with Microsoft's compiler |
40 | */ |
41 | #if defined __GNUC__ \ |
42 | && (__GNUC__ > 4 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 2)) \ |
43 | && __STDC_VERSION__ < 201112L |
44 | #pragma GCC diagnostic ignored "-Wsign-compare" |
45 | #elif defined _MSC_VER |
46 | #pragma warning(disable : 4018 4244 4146) |
47 | #endif |
48 | |
49 | /* clang-format off */ |
50 | |
51 | #include "tweetnacl.h" |
52 | |
53 | #define FOR(i,n) for (i = 0;i < n;++i) |
54 | #define sv static void |
55 | |
56 | static const u8 |
57 | _0[16], |
58 | _9[32] = {9}; |
59 | static const gf |
60 | gf0, |
61 | gf1 = {1}, |
62 | _121665 = {0xDB41,1}, |
63 | D = {0x78a3, 0x1359, 0x4dca, 0x75eb, 0xd8ab, 0x4141, 0x0a4d, 0x0070, 0xe898, 0x7779, 0x4079, 0x8cc7, 0xfe73, 0x2b6f, 0x6cee, 0x5203}, |
64 | D2 = {0xf159, 0x26b2, 0x9b94, 0xebd6, 0xb156, 0x8283, 0x149a, 0x00e0, 0xd130, 0xeef3, 0x80f2, 0x198e, 0xfce7, 0x56df, 0xd9dc, 0x2406}, |
65 | X = {0xd51a, 0x8f25, 0x2d60, 0xc956, 0xa7b2, 0x9525, 0xc760, 0x692c, 0xdc5c, 0xfdd6, 0xe231, 0xc0a4, 0x53fe, 0xcd6e, 0x36d3, 0x2169}, |
66 | Y = {0x6658, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666}, |
67 | I = {0xa0b0, 0x4a0e, 0x1b27, 0xc4ee, 0xe478, 0xad2f, 0x1806, 0x2f43, 0xd7a7, 0x3dfb, 0x0099, 0x2b4d, 0xdf0b, 0x4fc1, 0x2480, 0x2b83}; |
68 | |
69 | static u32 L32(u32 x,int c) { return (x << c) | ((x&0xffffffff) >> (32 - c)); } |
70 | |
71 | static u32 ld32(const u8 *x) |
72 | { |
73 | u32 u = x[3]; |
74 | u = (u<<8)|x[2]; |
75 | u = (u<<8)|x[1]; |
76 | return (u<<8)|x[0]; |
77 | } |
78 | |
79 | static u64 dl64(const u8 *x) |
80 | { |
81 | u64 i,u=0; |
82 | FOR(i,8) u=(u<<8)|x[i]; |
83 | return u; |
84 | } |
85 | |
86 | sv st32(u8 *x,u32 u) |
87 | { |
88 | int i; |
89 | FOR(i,4) { x[i] = u; u >>= 8; } |
90 | } |
91 | |
92 | sv ts64(u8 *x,u64 u) |
93 | { |
94 | int i; |
95 | for (i = 7;i >= 0;--i) { x[i] = u; u >>= 8; } |
96 | } |
97 | |
98 | static int vn(const u8 *x,const u8 *y,int n) |
99 | { |
100 | u32 i,d = 0; |
101 | FOR(i,n) d |= x[i]^y[i]; |
102 | return (1 & ((d - 1) >> 8)) - 1; |
103 | } |
104 | |
105 | int crypto_verify_16(const u8 *x,const u8 *y) |
106 | { |
107 | return vn(x,y,16); |
108 | } |
109 | |
110 | int crypto_verify_32(const u8 *x,const u8 *y) |
111 | { |
112 | return vn(x,y,32); |
113 | } |
114 | |
115 | sv core(u8 *out,const u8 *in,const u8 *k,const u8 *c,int h) |
116 | { |
117 | u32 w[16],x[16],y[16],t[4]; |
118 | int i,j,m; |
119 | |
120 | FOR(i,4) { |
121 | x[5*i] = ld32(c+4*i); |
122 | x[1+i] = ld32(k+4*i); |
123 | x[6+i] = ld32(in+4*i); |
124 | x[11+i] = ld32(k+16+4*i); |
125 | } |
126 | |
127 | FOR(i,16) y[i] = x[i]; |
128 | |
129 | FOR(i,20) { |
130 | FOR(j,4) { |
131 | FOR(m,4) t[m] = x[(5*j+4*m)%16]; |
132 | t[1] ^= L32(t[0]+t[3], 7); |
133 | t[2] ^= L32(t[1]+t[0], 9); |
134 | t[3] ^= L32(t[2]+t[1],13); |
135 | t[0] ^= L32(t[3]+t[2],18); |
136 | FOR(m,4) w[4*j+(j+m)%4] = t[m]; |
137 | } |
138 | FOR(m,16) x[m] = w[m]; |
139 | } |
140 | |
141 | if (h) { |
142 | FOR(i,16) x[i] += y[i]; |
143 | FOR(i,4) { |
144 | x[5*i] -= ld32(c+4*i); |
145 | x[6+i] -= ld32(in+4*i); |
146 | } |
147 | FOR(i,4) { |
148 | st32(out+4*i,x[5*i]); |
149 | st32(out+16+4*i,x[6+i]); |
150 | } |
151 | } else |
152 | FOR(i,16) st32(out + 4 * i,x[i] + y[i]); |
153 | } |
154 | |
155 | int crypto_core_salsa20(u8 *out,const u8 *in,const u8 *k,const u8 *c) |
156 | { |
157 | core(out,in,k,c,0); |
158 | return 0; |
159 | } |
160 | |
161 | int crypto_core_hsalsa20(u8 *out,const u8 *in,const u8 *k,const u8 *c) |
162 | { |
163 | core(out,in,k,c,1); |
164 | return 0; |
165 | } |
166 | |
167 | static const u8 sigma[16] = "expand 32-byte k" ; |
168 | |
169 | int crypto_stream_salsa20_xor(u8 *c,const u8 *m,u64 b,const u8 *n,const u8 *k) |
170 | { |
171 | u8 z[16],x[64]; |
172 | u32 u,i; |
173 | if (!b) return 0; |
174 | FOR(i,16) z[i] = 0; |
175 | FOR(i,8) z[i] = n[i]; |
176 | while (b >= 64) { |
177 | crypto_core_salsa20(x,z,k,sigma); |
178 | FOR(i,64) c[i] = (m?m[i]:0) ^ x[i]; |
179 | u = 1; |
180 | for (i = 8;i < 16;++i) { |
181 | u += (u32) z[i]; |
182 | z[i] = u; |
183 | u >>= 8; |
184 | } |
185 | b -= 64; |
186 | c += 64; |
187 | if (m) m += 64; |
188 | } |
189 | if (b) { |
190 | crypto_core_salsa20(x,z,k,sigma); |
191 | FOR(i,b) c[i] = (m?m[i]:0) ^ x[i]; |
192 | } |
193 | return 0; |
194 | } |
195 | |
196 | int crypto_stream_salsa20(u8 *c,u64 d,const u8 *n,const u8 *k) |
197 | { |
198 | return crypto_stream_salsa20_xor(c,0,d,n,k); |
199 | } |
200 | |
201 | int crypto_stream(u8 *c,u64 d,const u8 *n,const u8 *k) |
202 | { |
203 | u8 s[32]; |
204 | crypto_core_hsalsa20(s,n,k,sigma); |
205 | return crypto_stream_salsa20(c,d,n+16,s); |
206 | } |
207 | |
208 | int crypto_stream_xor(u8 *c,const u8 *m,u64 d,const u8 *n,const u8 *k) |
209 | { |
210 | u8 s[32]; |
211 | crypto_core_hsalsa20(s,n,k,sigma); |
212 | return crypto_stream_salsa20_xor(c,m,d,n+16,s); |
213 | } |
214 | |
215 | sv add1305(u32 *h,const u32 *c) |
216 | { |
217 | u32 j,u = 0; |
218 | FOR(j,17) { |
219 | u += h[j] + c[j]; |
220 | h[j] = u & 255; |
221 | u >>= 8; |
222 | } |
223 | } |
224 | |
225 | static const u32 minusp[17] = { |
226 | 5, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 252 |
227 | } ; |
228 | |
229 | int crypto_onetimeauth(u8 *out,const u8 *m,u64 n,const u8 *k) |
230 | { |
231 | u32 s,i,j,u,x[17],r[17],h[17],c[17],g[17]; |
232 | |
233 | FOR(j,17) r[j]=h[j]=0; |
234 | FOR(j,16) r[j]=k[j]; |
235 | r[3]&=15; |
236 | r[4]&=252; |
237 | r[7]&=15; |
238 | r[8]&=252; |
239 | r[11]&=15; |
240 | r[12]&=252; |
241 | r[15]&=15; |
242 | |
243 | while (n > 0) { |
244 | FOR(j,17) c[j] = 0; |
245 | for (j = 0;(j < 16) && (j < n);++j) c[j] = m[j]; |
246 | c[j] = 1; |
247 | m += j; n -= j; |
248 | add1305(h,c); |
249 | FOR(i,17) { |
250 | x[i] = 0; |
251 | FOR(j,17) x[i] += h[j] * ((j <= i) ? r[i - j] : 320 * r[i + 17 - j]); |
252 | } |
253 | FOR(i,17) h[i] = x[i]; |
254 | u = 0; |
255 | FOR(j,16) { |
256 | u += h[j]; |
257 | h[j] = u & 255; |
258 | u >>= 8; |
259 | } |
260 | u += h[16]; h[16] = u & 3; |
261 | u = 5 * (u >> 2); |
262 | FOR(j,16) { |
263 | u += h[j]; |
264 | h[j] = u & 255; |
265 | u >>= 8; |
266 | } |
267 | u += h[16]; h[16] = u; |
268 | } |
269 | |
270 | FOR(j,17) g[j] = h[j]; |
271 | add1305(h,minusp); |
272 | s = -(h[16] >> 7); |
273 | FOR(j,17) h[j] ^= s & (g[j] ^ h[j]); |
274 | |
275 | FOR(j,16) c[j] = k[j + 16]; |
276 | c[16] = 0; |
277 | add1305(h,c); |
278 | FOR(j,16) out[j] = h[j]; |
279 | return 0; |
280 | } |
281 | |
282 | int crypto_onetimeauth_verify(const u8 *h,const u8 *m,u64 n,const u8 *k) |
283 | { |
284 | u8 x[16]; |
285 | crypto_onetimeauth(x,m,n,k); |
286 | return crypto_verify_16(h,x); |
287 | } |
288 | |
289 | int crypto_secretbox(u8 *c,const u8 *m,u64 d,const u8 *n,const u8 *k) |
290 | { |
291 | int i; |
292 | if (d < 32) return -1; |
293 | crypto_stream_xor(c,m,d,n,k); |
294 | crypto_onetimeauth(c + 16,c + 32,d - 32,c); |
295 | FOR(i,16) c[i] = 0; |
296 | return 0; |
297 | } |
298 | |
299 | int crypto_secretbox_open(u8 *m,const u8 *c,u64 d,const u8 *n,const u8 *k) |
300 | { |
301 | int i; |
302 | u8 x[32]; |
303 | if (d < 32) return -1; |
304 | crypto_stream(x,32,n,k); |
305 | if (crypto_onetimeauth_verify(c + 16,c + 32,d - 32,x) != 0) return -1; |
306 | crypto_stream_xor(m,c,d,n,k); |
307 | FOR(i,32) m[i] = 0; |
308 | return 0; |
309 | } |
310 | |
311 | sv set25519(gf r, const gf a) |
312 | { |
313 | int i; |
314 | FOR(i,16) r[i]=a[i]; |
315 | } |
316 | |
317 | sv car25519(gf o) |
318 | { |
319 | int i; |
320 | i64 c; |
321 | FOR(i,16) { |
322 | o[i]+=(1LL<<16); |
323 | c=o[i]>>16; |
324 | o[(i+1)*(i<15)]+=c-1+37*(c-1)*(i==15); |
325 | o[i]-=c<<16; |
326 | } |
327 | } |
328 | |
329 | sv sel25519(gf p,gf q,int b) |
330 | { |
331 | i64 t,i,c=~(b-1); |
332 | FOR(i,16) { |
333 | t= c&(p[i]^q[i]); |
334 | p[i]^=t; |
335 | q[i]^=t; |
336 | } |
337 | } |
338 | |
339 | sv pack25519(u8 *o,const gf n) |
340 | { |
341 | int i,j,b; |
342 | gf m,t; |
343 | FOR(i,16) t[i]=n[i]; |
344 | car25519(t); |
345 | car25519(t); |
346 | car25519(t); |
347 | FOR(j,2) { |
348 | m[0]=t[0]-0xffed; |
349 | for(i=1;i<15;i++) { |
350 | m[i]=t[i]-0xffff-((m[i-1]>>16)&1); |
351 | m[i-1]&=0xffff; |
352 | } |
353 | m[15]=t[15]-0x7fff-((m[14]>>16)&1); |
354 | b=(m[15]>>16)&1; |
355 | m[14]&=0xffff; |
356 | sel25519(t,m,1-b); |
357 | } |
358 | FOR(i,16) { |
359 | o[2*i]=t[i]&0xff; |
360 | o[2*i+1]=t[i]>>8; |
361 | } |
362 | } |
363 | |
364 | static int neq25519(const gf a, const gf b) |
365 | { |
366 | u8 c[32],d[32]; |
367 | pack25519(c,a); |
368 | pack25519(d,b); |
369 | return crypto_verify_32(c,d); |
370 | } |
371 | |
372 | static u8 par25519(const gf a) |
373 | { |
374 | u8 d[32]; |
375 | pack25519(d,a); |
376 | return d[0]&1; |
377 | } |
378 | |
379 | sv unpack25519(gf o, const u8 *n) |
380 | { |
381 | int i; |
382 | FOR(i,16) o[i]=n[2*i]+((i64)n[2*i+1]<<8); |
383 | o[15]&=0x7fff; |
384 | } |
385 | |
386 | sv A(gf o,const gf a,const gf b) |
387 | { |
388 | int i; |
389 | FOR(i,16) o[i]=a[i]+b[i]; |
390 | } |
391 | |
392 | sv Z(gf o,const gf a,const gf b) |
393 | { |
394 | int i; |
395 | FOR(i,16) o[i]=a[i]-b[i]; |
396 | } |
397 | |
398 | sv M(gf o,const gf a,const gf b) |
399 | { |
400 | i64 i,j,t[31]; |
401 | FOR(i,31) t[i]=0; |
402 | FOR(i,16) FOR(j,16) t[i+j]+=a[i]*b[j]; |
403 | FOR(i,15) t[i]+=38*t[i+16]; |
404 | FOR(i,16) o[i]=t[i]; |
405 | car25519(o); |
406 | car25519(o); |
407 | } |
408 | |
409 | sv S(gf o,const gf a) |
410 | { |
411 | M(o,a,a); |
412 | } |
413 | |
414 | sv inv25519(gf o,const gf i) |
415 | { |
416 | gf c; |
417 | int a; |
418 | FOR(a,16) c[a]=i[a]; |
419 | for(a=253;a>=0;a--) { |
420 | S(c,c); |
421 | if(a!=2&&a!=4) M(c,c,i); |
422 | } |
423 | FOR(a,16) o[a]=c[a]; |
424 | } |
425 | |
426 | sv pow2523(gf o,const gf i) |
427 | { |
428 | gf c; |
429 | int a; |
430 | FOR(a,16) c[a]=i[a]; |
431 | for(a=250;a>=0;a--) { |
432 | S(c,c); |
433 | if(a!=1) M(c,c,i); |
434 | } |
435 | FOR(a,16) o[a]=c[a]; |
436 | } |
437 | |
438 | int crypto_scalarmult(u8 *q,const u8 *n,const u8 *p) |
439 | { |
440 | u8 z[32]; |
441 | i64 x[80],r,i; |
442 | gf a,b,c,d,e,f; |
443 | FOR(i,31) z[i]=n[i]; |
444 | z[31]=(n[31]&127)|64; |
445 | z[0]&=248; |
446 | unpack25519(x,p); |
447 | FOR(i,16) { |
448 | b[i]=x[i]; |
449 | d[i]=a[i]=c[i]=0; |
450 | } |
451 | a[0]=d[0]=1; |
452 | for(i=254;i>=0;--i) { |
453 | r=(z[i>>3]>>(i&7))&1; |
454 | sel25519(a,b,r); |
455 | sel25519(c,d,r); |
456 | A(e,a,c); |
457 | Z(a,a,c); |
458 | A(c,b,d); |
459 | Z(b,b,d); |
460 | S(d,e); |
461 | S(f,a); |
462 | M(a,c,a); |
463 | M(c,b,e); |
464 | A(e,a,c); |
465 | Z(a,a,c); |
466 | S(b,a); |
467 | Z(c,d,f); |
468 | M(a,c,_121665); |
469 | A(a,a,d); |
470 | M(c,c,a); |
471 | M(a,d,f); |
472 | M(d,b,x); |
473 | S(b,e); |
474 | sel25519(a,b,r); |
475 | sel25519(c,d,r); |
476 | } |
477 | FOR(i,16) { |
478 | x[i+16]=a[i]; |
479 | x[i+32]=c[i]; |
480 | x[i+48]=b[i]; |
481 | x[i+64]=d[i]; |
482 | } |
483 | inv25519(x+32,x+32); |
484 | M(x+16,x+16,x+32); |
485 | pack25519(q,x+16); |
486 | return 0; |
487 | } |
488 | |
489 | int crypto_scalarmult_base(u8 *q,const u8 *n) |
490 | { |
491 | return crypto_scalarmult(q,n,_9); |
492 | } |
493 | |
494 | int crypto_box_keypair(u8 *y,u8 *x) |
495 | { |
496 | randombytes(x,32); |
497 | return crypto_scalarmult_base(y,x); |
498 | } |
499 | |
500 | int crypto_box_beforenm(u8 *k,const u8 *y,const u8 *x) |
501 | { |
502 | u8 s[32]; |
503 | crypto_scalarmult(s,x,y); |
504 | return crypto_core_hsalsa20(k,_0,s,sigma); |
505 | } |
506 | |
507 | int crypto_box_afternm(u8 *c,const u8 *m,u64 d,const u8 *n,const u8 *k) |
508 | { |
509 | return crypto_secretbox(c,m,d,n,k); |
510 | } |
511 | |
512 | int crypto_box_open_afternm(u8 *m,const u8 *c,u64 d,const u8 *n,const u8 *k) |
513 | { |
514 | return crypto_secretbox_open(m,c,d,n,k); |
515 | } |
516 | |
517 | int crypto_box(u8 *c,const u8 *m,u64 d,const u8 *n,const u8 *y,const u8 *x) |
518 | { |
519 | u8 k[32]; |
520 | crypto_box_beforenm(k,y,x); |
521 | return crypto_box_afternm(c,m,d,n,k); |
522 | } |
523 | |
524 | int crypto_box_open(u8 *m,const u8 *c,u64 d,const u8 *n,const u8 *y,const u8 *x) |
525 | { |
526 | u8 k[32]; |
527 | crypto_box_beforenm(k,y,x); |
528 | return crypto_box_open_afternm(m,c,d,n,k); |
529 | } |
530 | |
531 | static u64 R(u64 x,int c) { return (x >> c) | (x << (64 - c)); } |
532 | static u64 Ch(u64 x,u64 y,u64 z) { return (x & y) ^ (~x & z); } |
533 | static u64 Maj(u64 x,u64 y,u64 z) { return (x & y) ^ (x & z) ^ (y & z); } |
534 | static u64 Sigma0(u64 x) { return R(x,28) ^ R(x,34) ^ R(x,39); } |
535 | static u64 Sigma1(u64 x) { return R(x,14) ^ R(x,18) ^ R(x,41); } |
536 | static u64 sigma0(u64 x) { return R(x, 1) ^ R(x, 8) ^ (x >> 7); } |
537 | static u64 sigma1(u64 x) { return R(x,19) ^ R(x,61) ^ (x >> 6); } |
538 | |
539 | static const u64 K[80] = |
540 | { |
541 | 0x428a2f98d728ae22ULL, 0x7137449123ef65cdULL, 0xb5c0fbcfec4d3b2fULL, 0xe9b5dba58189dbbcULL, |
542 | 0x3956c25bf348b538ULL, 0x59f111f1b605d019ULL, 0x923f82a4af194f9bULL, 0xab1c5ed5da6d8118ULL, |
543 | 0xd807aa98a3030242ULL, 0x12835b0145706fbeULL, 0x243185be4ee4b28cULL, 0x550c7dc3d5ffb4e2ULL, |
544 | 0x72be5d74f27b896fULL, 0x80deb1fe3b1696b1ULL, 0x9bdc06a725c71235ULL, 0xc19bf174cf692694ULL, |
545 | 0xe49b69c19ef14ad2ULL, 0xefbe4786384f25e3ULL, 0x0fc19dc68b8cd5b5ULL, 0x240ca1cc77ac9c65ULL, |
546 | 0x2de92c6f592b0275ULL, 0x4a7484aa6ea6e483ULL, 0x5cb0a9dcbd41fbd4ULL, 0x76f988da831153b5ULL, |
547 | 0x983e5152ee66dfabULL, 0xa831c66d2db43210ULL, 0xb00327c898fb213fULL, 0xbf597fc7beef0ee4ULL, |
548 | 0xc6e00bf33da88fc2ULL, 0xd5a79147930aa725ULL, 0x06ca6351e003826fULL, 0x142929670a0e6e70ULL, |
549 | 0x27b70a8546d22ffcULL, 0x2e1b21385c26c926ULL, 0x4d2c6dfc5ac42aedULL, 0x53380d139d95b3dfULL, |
550 | 0x650a73548baf63deULL, 0x766a0abb3c77b2a8ULL, 0x81c2c92e47edaee6ULL, 0x92722c851482353bULL, |
551 | 0xa2bfe8a14cf10364ULL, 0xa81a664bbc423001ULL, 0xc24b8b70d0f89791ULL, 0xc76c51a30654be30ULL, |
552 | 0xd192e819d6ef5218ULL, 0xd69906245565a910ULL, 0xf40e35855771202aULL, 0x106aa07032bbd1b8ULL, |
553 | 0x19a4c116b8d2d0c8ULL, 0x1e376c085141ab53ULL, 0x2748774cdf8eeb99ULL, 0x34b0bcb5e19b48a8ULL, |
554 | 0x391c0cb3c5c95a63ULL, 0x4ed8aa4ae3418acbULL, 0x5b9cca4f7763e373ULL, 0x682e6ff3d6b2b8a3ULL, |
555 | 0x748f82ee5defb2fcULL, 0x78a5636f43172f60ULL, 0x84c87814a1f0ab72ULL, 0x8cc702081a6439ecULL, |
556 | 0x90befffa23631e28ULL, 0xa4506cebde82bde9ULL, 0xbef9a3f7b2c67915ULL, 0xc67178f2e372532bULL, |
557 | 0xca273eceea26619cULL, 0xd186b8c721c0c207ULL, 0xeada7dd6cde0eb1eULL, 0xf57d4f7fee6ed178ULL, |
558 | 0x06f067aa72176fbaULL, 0x0a637dc5a2c898a6ULL, 0x113f9804bef90daeULL, 0x1b710b35131c471bULL, |
559 | 0x28db77f523047d84ULL, 0x32caab7b40c72493ULL, 0x3c9ebe0a15c9bebcULL, 0x431d67c49c100d4cULL, |
560 | 0x4cc5d4becb3e42b6ULL, 0x597f299cfc657e2aULL, 0x5fcb6fab3ad6faecULL, 0x6c44198c4a475817ULL |
561 | }; |
562 | |
563 | int crypto_hashblocks(u8 *x,const u8 *m,u64 n) |
564 | { |
565 | u64 z[8],b[8],a[8],w[16],t; |
566 | int i,j; |
567 | |
568 | FOR(i,8) z[i] = a[i] = dl64(x + 8 * i); |
569 | |
570 | while (n >= 128) { |
571 | FOR(i,16) w[i] = dl64(m + 8 * i); |
572 | |
573 | FOR(i,80) { |
574 | FOR(j,8) b[j] = a[j]; |
575 | t = a[7] + Sigma1(a[4]) + Ch(a[4],a[5],a[6]) + K[i] + w[i%16]; |
576 | b[7] = t + Sigma0(a[0]) + Maj(a[0],a[1],a[2]); |
577 | b[3] += t; |
578 | FOR(j,8) a[(j+1)%8] = b[j]; |
579 | if (i%16 == 15) |
580 | FOR(j,16) |
581 | w[j] += w[(j+9)%16] + sigma0(w[(j+1)%16]) + sigma1(w[(j+14)%16]); |
582 | } |
583 | |
584 | FOR(i,8) { a[i] += z[i]; z[i] = a[i]; } |
585 | |
586 | m += 128; |
587 | n -= 128; |
588 | } |
589 | |
590 | FOR(i,8) ts64(x+8*i,z[i]); |
591 | |
592 | return n; |
593 | } |
594 | |
595 | static const u8 iv[64] = { |
596 | 0x6a,0x09,0xe6,0x67,0xf3,0xbc,0xc9,0x08, |
597 | 0xbb,0x67,0xae,0x85,0x84,0xca,0xa7,0x3b, |
598 | 0x3c,0x6e,0xf3,0x72,0xfe,0x94,0xf8,0x2b, |
599 | 0xa5,0x4f,0xf5,0x3a,0x5f,0x1d,0x36,0xf1, |
600 | 0x51,0x0e,0x52,0x7f,0xad,0xe6,0x82,0xd1, |
601 | 0x9b,0x05,0x68,0x8c,0x2b,0x3e,0x6c,0x1f, |
602 | 0x1f,0x83,0xd9,0xab,0xfb,0x41,0xbd,0x6b, |
603 | 0x5b,0xe0,0xcd,0x19,0x13,0x7e,0x21,0x79 |
604 | } ; |
605 | |
606 | int crypto_hash(u8 *out,const u8 *m,u64 n) |
607 | { |
608 | u8 h[64],x[256]; |
609 | u64 i,b = n; |
610 | |
611 | FOR(i,64) h[i] = iv[i]; |
612 | |
613 | crypto_hashblocks(h,m,n); |
614 | m += n; |
615 | n &= 127; |
616 | m -= n; |
617 | |
618 | FOR(i,256) x[i] = 0; |
619 | FOR(i,n) x[i] = m[i]; |
620 | x[n] = 128; |
621 | |
622 | n = 256-128*(n<112); |
623 | x[n-9] = b >> 61; |
624 | ts64(x+n-8,b<<3); |
625 | crypto_hashblocks(h,x,n); |
626 | |
627 | FOR(i,64) out[i] = h[i]; |
628 | |
629 | return 0; |
630 | } |
631 | |
632 | sv add(gf p[4],gf q[4]) |
633 | { |
634 | gf a,b,c,d,t,e,f,g,h; |
635 | |
636 | Z(a, p[1], p[0]); |
637 | Z(t, q[1], q[0]); |
638 | M(a, a, t); |
639 | A(b, p[0], p[1]); |
640 | A(t, q[0], q[1]); |
641 | M(b, b, t); |
642 | M(c, p[3], q[3]); |
643 | M(c, c, D2); |
644 | M(d, p[2], q[2]); |
645 | A(d, d, d); |
646 | Z(e, b, a); |
647 | Z(f, d, c); |
648 | A(g, d, c); |
649 | A(h, b, a); |
650 | |
651 | M(p[0], e, f); |
652 | M(p[1], h, g); |
653 | M(p[2], g, f); |
654 | M(p[3], e, h); |
655 | } |
656 | |
657 | sv cswap(gf p[4],gf q[4],u8 b) |
658 | { |
659 | int i; |
660 | FOR(i,4) |
661 | sel25519(p[i],q[i],b); |
662 | } |
663 | |
664 | sv pack(u8 *r,gf p[4]) |
665 | { |
666 | gf tx, ty, zi; |
667 | inv25519(zi, p[2]); |
668 | M(tx, p[0], zi); |
669 | M(ty, p[1], zi); |
670 | pack25519(r, ty); |
671 | r[31] ^= par25519(tx) << 7; |
672 | } |
673 | |
674 | sv scalarmult(gf p[4],gf q[4],const u8 *s) |
675 | { |
676 | int i; |
677 | set25519(p[0],gf0); |
678 | set25519(p[1],gf1); |
679 | set25519(p[2],gf1); |
680 | set25519(p[3],gf0); |
681 | for (i = 255;i >= 0;--i) { |
682 | u8 b = (s[i/8]>>(i&7))&1; |
683 | cswap(p,q,b); |
684 | add(q,p); |
685 | add(p,p); |
686 | cswap(p,q,b); |
687 | } |
688 | } |
689 | |
690 | sv scalarbase(gf p[4],const u8 *s) |
691 | { |
692 | gf q[4]; |
693 | set25519(q[0],X); |
694 | set25519(q[1],Y); |
695 | set25519(q[2],gf1); |
696 | M(q[3],X,Y); |
697 | scalarmult(p,q,s); |
698 | } |
699 | |
700 | int crypto_sign_keypair(u8 *pk, u8 *sk) |
701 | { |
702 | u8 d[64]; |
703 | gf p[4]; |
704 | int i; |
705 | |
706 | randombytes(sk, 32); |
707 | crypto_hash(d, sk, 32); |
708 | d[0] &= 248; |
709 | d[31] &= 127; |
710 | d[31] |= 64; |
711 | |
712 | scalarbase(p,d); |
713 | pack(pk,p); |
714 | |
715 | FOR(i,32) sk[32 + i] = pk[i]; |
716 | return 0; |
717 | } |
718 | |
719 | static const u64 L[32] = {0xed, 0xd3, 0xf5, 0x5c, 0x1a, 0x63, 0x12, 0x58, 0xd6, 0x9c, 0xf7, 0xa2, 0xde, 0xf9, 0xde, 0x14, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x10}; |
720 | |
721 | sv modL(u8 *r,i64 x[64]) |
722 | { |
723 | i64 carry,i,j; |
724 | for (i = 63;i >= 32;--i) { |
725 | carry = 0; |
726 | for (j = i - 32;j < i - 12;++j) { |
727 | x[j] += carry - 16 * x[i] * L[j - (i - 32)]; |
728 | carry = (x[j] + 128) >> 8; |
729 | x[j] -= carry << 8; |
730 | } |
731 | x[j] += carry; |
732 | x[i] = 0; |
733 | } |
734 | carry = 0; |
735 | FOR(j,32) { |
736 | x[j] += carry - (x[31] >> 4) * L[j]; |
737 | carry = x[j] >> 8; |
738 | x[j] &= 255; |
739 | } |
740 | FOR(j,32) x[j] -= carry * L[j]; |
741 | FOR(i,32) { |
742 | x[i+1] += x[i] >> 8; |
743 | r[i] = x[i] & 255; |
744 | } |
745 | } |
746 | |
747 | sv reduce(u8 *r) |
748 | { |
749 | i64 x[64],i; |
750 | FOR(i,64) x[i] = (u64) r[i]; |
751 | FOR(i,64) r[i] = 0; |
752 | modL(r,x); |
753 | } |
754 | |
755 | int crypto_sign(u8 *sm,u64 *smlen,const u8 *m,u64 n,const u8 *sk) |
756 | { |
757 | u8 d[64],h[64],r[64]; |
758 | i64 i,j,x[64]; |
759 | gf p[4]; |
760 | |
761 | crypto_hash(d, sk, 32); |
762 | d[0] &= 248; |
763 | d[31] &= 127; |
764 | d[31] |= 64; |
765 | |
766 | *smlen = n+64; |
767 | FOR(i,n) sm[64 + i] = m[i]; |
768 | FOR(i,32) sm[32 + i] = d[32 + i]; |
769 | |
770 | crypto_hash(r, sm+32, n+32); |
771 | reduce(r); |
772 | scalarbase(p,r); |
773 | pack(sm,p); |
774 | |
775 | FOR(i,32) sm[i+32] = sk[i+32]; |
776 | crypto_hash(h,sm,n + 64); |
777 | reduce(h); |
778 | |
779 | FOR(i,64) x[i] = 0; |
780 | FOR(i,32) x[i] = (u64) r[i]; |
781 | FOR(i,32) FOR(j,32) x[i+j] += h[i] * (u64) d[j]; |
782 | modL(sm + 32,x); |
783 | |
784 | return 0; |
785 | } |
786 | |
787 | static int unpackneg(gf r[4],const u8 p[32]) |
788 | { |
789 | gf t, chk, num, den, den2, den4, den6; |
790 | set25519(r[2],gf1); |
791 | unpack25519(r[1],p); |
792 | S(num,r[1]); |
793 | M(den,num,D); |
794 | Z(num,num,r[2]); |
795 | A(den,r[2],den); |
796 | |
797 | S(den2,den); |
798 | S(den4,den2); |
799 | M(den6,den4,den2); |
800 | M(t,den6,num); |
801 | M(t,t,den); |
802 | |
803 | pow2523(t,t); |
804 | M(t,t,num); |
805 | M(t,t,den); |
806 | M(t,t,den); |
807 | M(r[0],t,den); |
808 | |
809 | S(chk,r[0]); |
810 | M(chk,chk,den); |
811 | if (neq25519(chk, num)) M(r[0],r[0],I); |
812 | |
813 | S(chk,r[0]); |
814 | M(chk,chk,den); |
815 | if (neq25519(chk, num)) return -1; |
816 | |
817 | if (par25519(r[0]) == (p[31]>>7)) Z(r[0],gf0,r[0]); |
818 | |
819 | M(r[3],r[0],r[1]); |
820 | return 0; |
821 | } |
822 | |
823 | int crypto_sign_open(u8 *m,u64 *mlen,const u8 *sm,u64 n,const u8 *pk) |
824 | { |
825 | int i; |
826 | u8 t[32],h[64]; |
827 | gf p[4],q[4]; |
828 | |
829 | *mlen = -1; |
830 | if (n < 64) return -1; |
831 | |
832 | if (unpackneg(q,pk)) return -1; |
833 | |
834 | FOR(i,n) m[i] = sm[i]; |
835 | FOR(i,32) m[i+32] = pk[i]; |
836 | crypto_hash(h,m,n); |
837 | reduce(h); |
838 | scalarmult(p,q,h); |
839 | |
840 | scalarbase(q,sm + 32); |
841 | add(p,q); |
842 | pack(t,p); |
843 | |
844 | n -= 64; |
845 | if (crypto_verify_32(sm, t)) { |
846 | FOR(i,n) m[i] = 0; |
847 | return -1; |
848 | } |
849 | |
850 | FOR(i,n) m[i] = sm[i + 64]; |
851 | *mlen = n; |
852 | return 0; |
853 | } |
854 | |
855 | |
856 | #ifdef ZMQ_HAVE_WINDOWS |
857 | |
858 | #include <windows.h> |
859 | #include <wincrypt.h> |
860 | |
861 | #define NCP ((HCRYPTPROV) 0) |
862 | |
863 | HCRYPTPROV hProvider = NCP; |
864 | |
865 | void randombytes(unsigned char *x,unsigned long long xlen) |
866 | { |
867 | unsigned i; |
868 | BOOL ret; |
869 | |
870 | if (hProvider == NCP) { |
871 | for (;;) { |
872 | ret = CryptAcquireContext(&hProvider, NULL, NULL, |
873 | PROV_RSA_FULL, CRYPT_VERIFYCONTEXT | CRYPT_SILENT); |
874 | if (ret != FALSE) |
875 | break; |
876 | Sleep (1); |
877 | } |
878 | } |
879 | while (xlen > 0) { |
880 | if (xlen < 1048576) |
881 | i = (unsigned) xlen; |
882 | else |
883 | i = 1048576; |
884 | |
885 | ret = CryptGenRandom(hProvider, i, x); |
886 | if (ret == FALSE) { |
887 | Sleep(1); |
888 | continue; |
889 | } |
890 | x += i; |
891 | xlen -= i; |
892 | } |
893 | } |
894 | |
895 | int randombytes_close(void) |
896 | { |
897 | int rc = -1; |
898 | if ((hProvider != NCP) && (CryptReleaseContext(hProvider, 0) != FALSE)) { |
899 | hProvider = NCP; |
900 | rc = 0; |
901 | } |
902 | return rc; |
903 | } |
904 | |
905 | int sodium_init (void) |
906 | { |
907 | return 0; |
908 | } |
909 | |
910 | #else |
911 | |
912 | #include <unistd.h> |
913 | #include <assert.h> |
914 | |
915 | #ifdef ZMQ_HAVE_GETRANDOM |
916 | #include <sys/random.h> |
917 | #else |
918 | #include <sys/types.h> |
919 | #include <sys/stat.h> |
920 | #include <fcntl.h> |
921 | |
922 | static int fd = -1; |
923 | #endif |
924 | |
925 | void randombytes (unsigned char *x,unsigned long long xlen) |
926 | { |
927 | int i; |
928 | #ifndef ZMQ_HAVE_GETRANDOM |
929 | /* Require that random_open has already been called, to avoid |
930 | race conditions. */ |
931 | assert (fd != -1); |
932 | #endif |
933 | while (xlen > 0) { |
934 | if (xlen < 1048576) |
935 | i = xlen; |
936 | else |
937 | i = 1048576; |
938 | |
939 | #ifdef ZMQ_HAVE_GETRANDOM |
940 | i = getrandom (x, i, 0); |
941 | #else |
942 | i = read(fd,x,i); |
943 | #endif |
944 | if (i < 1) { |
945 | sleep (1); |
946 | continue; |
947 | } |
948 | x += i; |
949 | xlen -= i; |
950 | } |
951 | } |
952 | |
953 | /* Do not call manually! Use random_close from random.hpp */ |
954 | int randombytes_close (void) |
955 | { |
956 | int rc = -1; |
957 | #ifndef ZMQ_HAVE_GETRANDOM |
958 | if (fd != -1 && close(fd) == 0) { |
959 | fd = -1; |
960 | rc = 0; |
961 | } |
962 | #endif /* ZMQ_HAVE_GETRANDOM */ |
963 | return rc; |
964 | } |
965 | |
966 | /* Do not call manually! Use random_open from random.hpp */ |
967 | int sodium_init (void) |
968 | { |
969 | #ifndef ZMQ_HAVE_GETRANDOM |
970 | if (fd == -1) { |
971 | for (;;) { |
972 | int flags = O_RDONLY; |
973 | #ifdef ZMQ_HAVE_O_CLOEXEC |
974 | flags |= O_CLOEXEC; |
975 | #endif |
976 | fd = open ("/dev/urandom" , flags); |
977 | if (fd != -1) |
978 | break; |
979 | sleep (1); |
980 | } |
981 | #if !defined ZMQ_HAVE_O_CLOEXEC && defined FD_CLOEXEC |
982 | int rc = fcntl (fd, F_SETFD, FD_CLOEXEC); |
983 | assert (rc != -1); |
984 | #endif |
985 | } |
986 | #endif /* ZMQ_HAVE_GETRANDOM */ |
987 | return 0; |
988 | } |
989 | |
990 | #endif |
991 | |
992 | #endif |
993 | /* clang-format on */ |
994 | |